From 0d46d49aa3494e2fecbd1979bbb1bdb3ef7452f4 Mon Sep 17 00:00:00 2001
From: =?utf8?q?S=C3=A9bastien=20Lesaint?=
Date: Tue, 12 May 2015 10:47:32 +0200
Subject: [PATCH] rename UserSession.login=>getLogin and
UserSessionRule.logon=>login
allow using the method name login() for the login action in UserSessionRule
---
.../server/activity/ActivityService.java | 2 +-
.../component/ws/ComponentAppAction.java | 2 +-
.../server/component/ws/SearchAction.java | 2 +-
.../dashboard/ws/DashboardsShowAction.java | 2 +-
.../org/sonar/server/issue/ActionService.java | 2 +-
.../issue/InternalRubyIssueService.java | 2 +-
.../server/issue/IssueBulkChangeService.java | 2 +-
.../server/issue/IssueCommentService.java | 6 +--
.../org/sonar/server/issue/IssueQuery.java | 4 +-
.../sonar/server/issue/IssueQueryService.java | 2 +-
.../org/sonar/server/issue/IssueService.java | 12 ++---
.../issue/actionplan/ActionPlanService.java | 2 +-
.../issue/filter/IssueFilterService.java | 4 +-
.../issue/filter/IssueFilterWriter.java | 2 +-
.../sonar/server/issue/index/IssueIndex.java | 4 +-
.../server/issue/ws/IssueActionsWriter.java | 2 +-
.../server/issue/ws/IssueShowAction.java | 2 +-
.../sonar/server/issue/ws/SearchAction.java | 6 +--
.../qualityprofile/QProfileProjectLookup.java | 2 +-
.../ws/QProfileProjectsAction.java | 2 +-
.../org/sonar/server/rule/RuleUpdater.java | 2 +-
.../org/sonar/server/search/QueryContext.java | 4 +-
.../ui/ws/ComponentNavigationAction.java | 4 +-
.../server/ui/ws/GlobalNavigationAction.java | 2 +-
.../server/user/AbstractUserSession.java | 8 +--
.../sonar/server/user/DefaultUserService.java | 2 +-
.../server/user/ThreadLocalUserSession.java | 16 +++---
.../org/sonar/server/user/UserSession.java | 8 +--
.../server/user/ws/CurrentUserAction.java | 4 +-
.../server/activity/ActivityServiceTest.java | 2 +-
.../sonar/server/batch/IssuesActionTest.java | 14 ++---
.../ProjectRepositoryLoaderMediumTest.java | 54 +++++++++----------
.../sonar/server/batch/UsersActionTest.java | 2 +-
.../ComponentCleanerServiceMediumTest.java | 2 +-
.../component/ComponentServiceMediumTest.java | 34 ++++++------
.../component/ws/ComponentAppActionTest.java | 4 +-
.../server/component/ws/SearchActionTest.java | 12 ++---
.../sonar/server/issue/ActionServiceTest.java | 4 +-
.../IssueBulkChangeServiceMediumTest.java | 4 +-
.../issue/IssueChangelogServiceTest.java | 2 +-
.../issue/IssueCommentServiceMediumTest.java | 4 +-
.../server/issue/IssueCommentServiceTest.java | 2 +-
.../server/issue/IssueServiceMediumTest.java | 40 +++++++-------
.../server/issue/filter/AppActionTest.java | 8 +--
.../issue/filter/FavoritesActionTest.java | 4 +-
.../server/issue/filter/ShowActionTest.java | 4 +-
.../server/issue/index/IssueIndexTest.java | 20 +++----
.../issue/ws/IssueActionsWriterTest.java | 12 ++---
.../server/issue/ws/IssueShowActionTest.java | 6 +--
.../ws/SearchActionComponentsMediumTest.java | 12 ++---
.../issue/ws/SearchActionMediumTest.java | 20 +++----
.../InternalPermissionServiceMediumTest.java | 8 +--
...InternalPermissionTemplateServiceTest.java | 4 +-
.../PermissionTemplateUpdaterTest.java | 4 +-
.../platform/ws/SystemInfoWsActionTest.java | 2 +-
.../QProfileProjectOperationsMediumTest.java | 2 +-
.../QProfileServiceMediumTest.java | 20 +++----
.../QProfileChangeParentActionMediumTest.java | 4 +-
.../ws/QProfileCopyActionTest.java | 10 ++--
.../ws/QProfileCreateActionMediumTest.java | 6 +--
.../ws/QProfileCreateActionTest.java | 2 +-
.../ws/QProfileDeleteActionTest.java | 16 +++---
.../ws/QProfileProjectsActionTest.java | 2 +-
.../ws/QProfileRenameActionTest.java | 12 ++---
.../ws/QProfileRestoreActionTest.java | 6 +--
.../ws/QProfileSetDefaultActionTest.java | 10 ++--
.../ws/QProfilesWsMediumTest.java | 2 +-
.../server/rule/RegisterRulesMediumTest.java | 6 +--
.../server/rule/RuleServiceMediumTest.java | 12 ++---
.../server/rule/RuleUpdaterMediumTest.java | 2 +-
.../rule/ws/CreateActionMediumTest.java | 2 +-
.../server/rule/ws/ShowActionMediumTest.java | 2 +-
.../rule/ws/UpdateActionMediumTest.java | 2 +-
.../sonar/server/search/QueryContextTest.java | 2 +-
.../server/source/ws/HashActionTest.java | 8 +--
.../server/source/ws/LinesActionTest.java | 12 ++---
.../server/tester/MockUserSessionTest.java | 4 +-
.../sonar/server/tester/UserSessionRule.java | 33 ++++++------
.../ui/ws/ComponentNavigationActionTest.java | 14 ++---
.../ui/ws/GlobalNavigationActionTest.java | 6 +--
.../server/user/DefaultUserServiceTest.java | 8 +--
.../server/user/RubyUserSessionTest.java | 16 +++---
.../server/user/ServerUserSessionTest.java | 2 +-
.../user/ThreadLocalUserSessionTest.java | 8 +--
.../user/ws/ChangePasswordActionTest.java | 4 +-
.../server/user/ws/CreateActionTest.java | 6 +--
.../server/user/ws/CurrentUserActionTest.java | 2 +-
.../server/user/ws/DeactivateActionTest.java | 6 +--
.../server/user/ws/UpdateActionTest.java | 4 +-
.../view/index/ViewIndexerMediumTest.java | 2 +-
90 files changed, 327 insertions(+), 326 deletions(-)
diff --git a/server/sonar-server/src/main/java/org/sonar/server/activity/ActivityService.java b/server/sonar-server/src/main/java/org/sonar/server/activity/ActivityService.java
index 81d7779ada4..d08a36ff518 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/activity/ActivityService.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/activity/ActivityService.java
@@ -43,7 +43,7 @@ public class ActivityService {
public void save(Activity activity) {
ActivityDto dto = new ActivityDto()
.setKey(Uuids.create())
- .setAuthor(userSession.login())
+ .setAuthor(userSession.getLogin())
.setAction(activity.getAction())
.setMessage(activity.getMessage())
.setData(KeyValueFormat.format(activity.getData()))
diff --git a/server/sonar-server/src/main/java/org/sonar/server/component/ws/ComponentAppAction.java b/server/sonar-server/src/main/java/org/sonar/server/component/ws/ComponentAppAction.java
index 83aa5dd8f1d..8566ea5848c 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/component/ws/ComponentAppAction.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/component/ws/ComponentAppAction.java
@@ -121,7 +121,7 @@ public class ComponentAppAction implements RequestHandler {
List propertyDtos = dbClient.propertiesDao().selectByQuery(PropertyQuery.builder()
.setKey("favourite")
.setComponentId(component.getId())
- .setUserId(userSession.userId())
+ .setUserId(userSession.getUserId())
.build(),
session
);
diff --git a/server/sonar-server/src/main/java/org/sonar/server/component/ws/SearchAction.java b/server/sonar-server/src/main/java/org/sonar/server/component/ws/SearchAction.java
index 2ac0799b78b..1ba691ccae6 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/component/ws/SearchAction.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/component/ws/SearchAction.java
@@ -95,7 +95,7 @@ public class SearchAction implements RequestHandler {
userSession.checkProjectUuidPermission(UserRole.USER, componentDto.projectUuid());
Set projectIds = newLinkedHashSet(dbClient.componentIndexDao().selectProjectIdsFromQueryAndViewOrSubViewUuid(session, query, componentDto.uuid()));
- Collection authorizedProjectIds = dbClient.authorizationDao().keepAuthorizedProjectIds(session, projectIds, userSession.userId(), UserRole.USER);
+ Collection authorizedProjectIds = dbClient.authorizationDao().keepAuthorizedProjectIds(session, projectIds, userSession.getUserId(), UserRole.USER);
SearchOptions options = new SearchOptions();
options.setPage(request.mandatoryParamAsInt(PAGE), request.mandatoryParamAsInt(PAGE_SIZE));
diff --git a/server/sonar-server/src/main/java/org/sonar/server/dashboard/ws/DashboardsShowAction.java b/server/sonar-server/src/main/java/org/sonar/server/dashboard/ws/DashboardsShowAction.java
index 1c053863f4b..71e26c747dd 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/dashboard/ws/DashboardsShowAction.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/dashboard/ws/DashboardsShowAction.java
@@ -62,7 +62,7 @@ public class DashboardsShowAction implements DashboardsAction {
public void handle(Request request, Response response) throws Exception {
DbSession dbSession = dbClient.openSession(false);
try {
- Integer userId = userSession.userId();
+ Integer userId = userSession.getUserId();
DashboardDto dashboard = dbClient.dashboardDao().getAllowedByKey(dbSession, request.mandatoryParamAsLong(PARAM_KEY),
userId != null ? userId.longValue() : null);
if (dashboard == null) {
diff --git a/server/sonar-server/src/main/java/org/sonar/server/issue/ActionService.java b/server/sonar-server/src/main/java/org/sonar/server/issue/ActionService.java
index d6f46b7dd0c..056d6e75575 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/issue/ActionService.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/issue/ActionService.java
@@ -110,7 +110,7 @@ public class ActionService {
throw new IllegalStateException("A condition is not respected");
}
- IssueChangeContext changeContext = IssueChangeContext.createUser(new Date(), userSession.login());
+ IssueChangeContext changeContext = IssueChangeContext.createUser(new Date(), userSession.getLogin());
Component project = dbClient.componentDao().getByKey(session, issue.projectKey());
FunctionContext functionContext = new FunctionContext(issue, updater, changeContext, getProjectSettings(project));
for (Function function : action.functions()) {
diff --git a/server/sonar-server/src/main/java/org/sonar/server/issue/InternalRubyIssueService.java b/server/sonar-server/src/main/java/org/sonar/server/issue/InternalRubyIssueService.java
index f6f0058ad10..38d3594632d 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/issue/InternalRubyIssueService.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/issue/InternalRubyIssueService.java
@@ -352,7 +352,7 @@ public class InternalRubyIssueService {
if (result.ok()) {
DefaultActionPlan actionPlan = DefaultActionPlan.create(name)
.setDescription(description)
- .setUserLogin(userSession.login())
+ .setUserLogin(userSession.getLogin())
.setDeadLine(deadLine);
// Can only set project on creation
diff --git a/server/sonar-server/src/main/java/org/sonar/server/issue/IssueBulkChangeService.java b/server/sonar-server/src/main/java/org/sonar/server/issue/IssueBulkChangeService.java
index 3737eb05dbd..e29eb8cde12 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/issue/IssueBulkChangeService.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/issue/IssueBulkChangeService.java
@@ -95,7 +95,7 @@ public class IssueBulkChangeService {
Repository repository = new Repository(issues);
List bulkActions = getActionsToApply(issueBulkChangeQuery, issues, userSession);
- IssueChangeContext issueChangeContext = IssueChangeContext.createUser(new Date(), userSession.login());
+ IssueChangeContext issueChangeContext = IssueChangeContext.createUser(new Date(), userSession.getLogin());
Set concernedProjects = new HashSet<>();
for (Issue issue : issues) {
ActionContext actionContext = new ActionContext(issue, issueChangeContext);
diff --git a/server/sonar-server/src/main/java/org/sonar/server/issue/IssueCommentService.java b/server/sonar-server/src/main/java/org/sonar/server/issue/IssueCommentService.java
index 8e1af0d3916..34cedf47052 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/issue/IssueCommentService.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/issue/IssueCommentService.java
@@ -97,7 +97,7 @@ public class IssueCommentService {
DbSession session = dbClient.openSession(false);
try {
DefaultIssue issue = issueService.getByKeyForUpdate(session, issueKey).toDefaultIssue();
- IssueChangeContext context = IssueChangeContext.createUser(new Date(), userSession.login());
+ IssueChangeContext context = IssueChangeContext.createUser(new Date(), userSession.getLogin());
updater.addComment(issue, text, context);
issueService.saveIssue(session, issue, context, text);
@@ -118,7 +118,7 @@ public class IssueCommentService {
if (comment == null) {
throw new NotFoundException("Comment not found: " + commentKey);
}
- if (Strings.isNullOrEmpty(comment.userLogin()) || !Objects.equal(comment.userLogin(), userSession.login())) {
+ if (Strings.isNullOrEmpty(comment.userLogin()) || !Objects.equal(comment.userLogin(), userSession.getLogin())) {
throw new ForbiddenException("You can only delete your own comments");
}
@@ -137,7 +137,7 @@ public class IssueCommentService {
if (comment == null) {
throw new NotFoundException("Comment not found: " + commentKey);
}
- if (Strings.isNullOrEmpty(comment.userLogin()) || !Objects.equal(comment.userLogin(), userSession.login())) {
+ if (Strings.isNullOrEmpty(comment.userLogin()) || !Objects.equal(comment.userLogin(), userSession.getLogin())) {
throw new ForbiddenException("You can only edit your own comments");
}
diff --git a/server/sonar-server/src/main/java/org/sonar/server/issue/IssueQuery.java b/server/sonar-server/src/main/java/org/sonar/server/issue/IssueQuery.java
index efe306caf7c..26c35fe6d8c 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/issue/IssueQuery.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/issue/IssueQuery.java
@@ -321,8 +321,8 @@ public class IssueQuery {
private boolean checkAuthorization = true;
private Builder(UserSession userSession) {
- this.userLogin = userSession.login();
- this.userGroups = userSession.userGroups();
+ this.userLogin = userSession.getLogin();
+ this.userGroups = userSession.getUserGroups();
}
public Builder issueKeys(@Nullable Collection l) {
diff --git a/server/sonar-server/src/main/java/org/sonar/server/issue/IssueQueryService.java b/server/sonar-server/src/main/java/org/sonar/server/issue/IssueQueryService.java
index 16220ab9603..f6923d6fa76 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/issue/IssueQueryService.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/issue/IssueQueryService.java
@@ -214,7 +214,7 @@ public class IssueQueryService {
assignees.addAll(assigneesFromParams);
}
if (assignees.contains(LOGIN_MYSELF)) {
- String login = userSession.login();
+ String login = userSession.getLogin();
if (login == null) {
assignees.add(UNKNOWN);
} else {
diff --git a/server/sonar-server/src/main/java/org/sonar/server/issue/IssueService.java b/server/sonar-server/src/main/java/org/sonar/server/issue/IssueService.java
index e73c04426f6..3f5489fccbf 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/issue/IssueService.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/issue/IssueService.java
@@ -152,7 +152,7 @@ public class IssueService {
DbSession session = dbClient.openSession(false);
try {
DefaultIssue defaultIssue = getByKeyForUpdate(session, issueKey).toDefaultIssue();
- IssueChangeContext context = IssueChangeContext.createUser(new Date(), userSession.login());
+ IssueChangeContext context = IssueChangeContext.createUser(new Date(), userSession.getLogin());
checkTransitionPermission(transitionKey, userSession, defaultIssue);
if (workflow.doTransition(defaultIssue, transitionKey, context)) {
saveIssue(session, defaultIssue, context, null);
@@ -187,7 +187,7 @@ public class IssueService {
throw new NotFoundException("Unknown user: " + assignee);
}
}
- IssueChangeContext context = IssueChangeContext.createUser(new Date(), userSession.login());
+ IssueChangeContext context = IssueChangeContext.createUser(new Date(), userSession.getLogin());
if (issueUpdater.assign(issue, user, context)) {
saveIssue(session, issue, context, null);
}
@@ -212,7 +212,7 @@ public class IssueService {
}
DefaultIssue issue = getByKeyForUpdate(session, issueKey).toDefaultIssue();
- IssueChangeContext context = IssueChangeContext.createUser(new Date(), userSession.login());
+ IssueChangeContext context = IssueChangeContext.createUser(new Date(), userSession.getLogin());
if (issueUpdater.plan(issue, actionPlan, context)) {
saveIssue(session, issue, context, null);
}
@@ -231,7 +231,7 @@ public class IssueService {
DefaultIssue issue = getByKeyForUpdate(session, issueKey).toDefaultIssue();
userSession.checkProjectPermission(UserRole.ISSUE_ADMIN, issue.projectKey());
- IssueChangeContext context = IssueChangeContext.createUser(new Date(), userSession.login());
+ IssueChangeContext context = IssueChangeContext.createUser(new Date(), userSession.getLogin());
if (issueUpdater.setManualSeverity(issue, severity, context)) {
saveIssue(session, issue, context, null);
}
@@ -267,7 +267,7 @@ public class IssueService {
.severity(Objects.firstNonNull(severity, Severity.MAJOR))
.effortToFix(effortToFix)
.ruleKey(ruleKey)
- .reporter(userSession.login())
+ .reporter(userSession.getLogin())
.assignee(findSourceLineUser(component.uuid(), line))
.build();
@@ -346,7 +346,7 @@ public class IssueService {
DbSession session = dbClient.openSession(false);
try {
DefaultIssue issue = getByKeyForUpdate(session, issueKey).toDefaultIssue();
- IssueChangeContext context = IssueChangeContext.createUser(new Date(), userSession.login());
+ IssueChangeContext context = IssueChangeContext.createUser(new Date(), userSession.getLogin());
if (issueUpdater.setTags(issue, tags, context)) {
saveIssue(session, issue, context, null);
}
diff --git a/server/sonar-server/src/main/java/org/sonar/server/issue/actionplan/ActionPlanService.java b/server/sonar-server/src/main/java/org/sonar/server/issue/actionplan/ActionPlanService.java
index d71d9c3d5cf..1d7299a8a20 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/issue/actionplan/ActionPlanService.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/issue/actionplan/ActionPlanService.java
@@ -104,7 +104,7 @@ public class ActionPlanService {
*/
private void unplanIssues(DefaultActionPlan actionPlan, UserSession userSession) {
List dtos = findIssuesByActionPlan(actionPlan.key());
- IssueChangeContext context = IssueChangeContext.createUser(new Date(), userSession.login());
+ IssueChangeContext context = IssueChangeContext.createUser(new Date(), userSession.getLogin());
List issues = newArrayList();
for (IssueDto issueDto : dtos) {
DefaultIssue issue = issueDto.toDefaultIssue();
diff --git a/server/sonar-server/src/main/java/org/sonar/server/issue/filter/IssueFilterService.java b/server/sonar-server/src/main/java/org/sonar/server/issue/filter/IssueFilterService.java
index 8b8909c4edc..a7e6e9d0ee0 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/issue/filter/IssueFilterService.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/issue/filter/IssueFilterService.java
@@ -213,14 +213,14 @@ public class IssueFilterService {
public boolean canShareFilter(UserSession userSession) {
if (userSession.isLoggedIn()) {
- String user = userSession.login();
+ String user = userSession.getLogin();
return hasUserSharingPermission(user);
}
return false;
}
public String getLoggedLogin(UserSession userSession) {
- String user = userSession.login();
+ String user = userSession.getLogin();
if (!userSession.isLoggedIn()) {
throw new UnauthorizedException("User is not logged in");
}
diff --git a/server/sonar-server/src/main/java/org/sonar/server/issue/filter/IssueFilterWriter.java b/server/sonar-server/src/main/java/org/sonar/server/issue/filter/IssueFilterWriter.java
index 8308be1b662..064cc2e5caa 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/issue/filter/IssueFilterWriter.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/issue/filter/IssueFilterWriter.java
@@ -44,7 +44,7 @@ public class IssueFilterWriter {
private boolean canModifyFilter(UserSession session, IssueFilterDto filter) {
return session.isLoggedIn() &&
- (StringUtils.equals(filter.getUserLogin(), session.login()) || session.hasGlobalPermission(GlobalPermissions.SYSTEM_ADMIN));
+ (StringUtils.equals(filter.getUserLogin(), session.getLogin()) || session.hasGlobalPermission(GlobalPermissions.SYSTEM_ADMIN));
}
}
diff --git a/server/sonar-server/src/main/java/org/sonar/server/issue/index/IssueIndex.java b/server/sonar-server/src/main/java/org/sonar/server/issue/index/IssueIndex.java
index 5a6930663a5..b73dc7a7a0b 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/issue/index/IssueIndex.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/issue/index/IssueIndex.java
@@ -521,7 +521,7 @@ public class IssueIndex extends BaseIndex {
}
private void addAssignedToMeFacetIfNeeded(SearchRequestBuilder builder, SearchOptions options, IssueQuery query, Map filters, QueryBuilder queryBuilder) {
- String login = userSession.login();
+ String login = userSession.getLogin();
if (!options.getFacets().contains(IssueFilterParameters.FACET_ASSIGNED_TO_ME) || StringUtils.isEmpty(login)) {
return;
@@ -713,7 +713,7 @@ public class IssueIndex extends BaseIndex {
*/
public Iterator selectIssuesForBatch(ComponentDto component) {
BoolFilterBuilder filter = FilterBuilders.boolFilter()
- .must(createAuthorizationFilter(true, userSession.login(), userSession.userGroups()))
+ .must(createAuthorizationFilter(true, userSession.getLogin(), userSession.getUserGroups()))
.mustNot(FilterBuilders.termsFilter(IssueIndexDefinition.FIELD_ISSUE_STATUS, Issue.STATUS_CLOSED));
switch (component.scope()) {
diff --git a/server/sonar-server/src/main/java/org/sonar/server/issue/ws/IssueActionsWriter.java b/server/sonar-server/src/main/java/org/sonar/server/issue/ws/IssueActionsWriter.java
index 2db4b0b35ef..a165eeaa5c1 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/issue/ws/IssueActionsWriter.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/issue/ws/IssueActionsWriter.java
@@ -66,7 +66,7 @@ public class IssueActionsWriter {
private List actions(Issue issue) {
List actions = newArrayList();
- String login = userSession.login();
+ String login = userSession.getLogin();
if (login != null) {
actions.add("comment");
if (issue.resolution() == null) {
diff --git a/server/sonar-server/src/main/java/org/sonar/server/issue/ws/IssueShowAction.java b/server/sonar-server/src/main/java/org/sonar/server/issue/ws/IssueShowAction.java
index 3e0a84f26a6..93d94ccada8 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/issue/ws/IssueShowAction.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/issue/ws/IssueShowAction.java
@@ -191,7 +191,7 @@ public class IssueShowAction implements BaseIssuesWsAction {
private void writeComments(Issue issue, JsonWriter json) {
json.name("comments").beginArray();
- String login = userSession.login();
+ String login = userSession.getLogin();
Map usersByLogin = newHashMap();
List comments = commentService.findComments(issue.key());
diff --git a/server/sonar-server/src/main/java/org/sonar/server/issue/ws/SearchAction.java b/server/sonar-server/src/main/java/org/sonar/server/issue/ws/SearchAction.java
index 87f867b01a8..2956de30133 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/issue/ws/SearchAction.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/issue/ws/SearchAction.java
@@ -343,7 +343,7 @@ public class SearchAction implements BaseIssuesWsAction {
collectFacetsData(request, result, projectUuids, componentUuids, userLogins, actionPlanKeys);
if (userSession.isLoggedIn()) {
- userLogins.add(userSession.login());
+ userLogins.add(userSession.getLogin());
}
DbSession session = dbClient.openSession(false);
@@ -418,7 +418,7 @@ public class SearchAction implements BaseIssuesWsAction {
assignees.remove(IssueQueryService.LOGIN_MYSELF);
}
addMandatoryFacetValues(results, IssueFilterParameters.ASSIGNEES, assignees);
- addMandatoryFacetValues(results, IssueFilterParameters.FACET_ASSIGNED_TO_ME, Arrays.asList(userSession.login()));
+ addMandatoryFacetValues(results, IssueFilterParameters.FACET_ASSIGNED_TO_ME, Arrays.asList(userSession.getLogin()));
addMandatoryFacetValues(results, IssueFilterParameters.REPORTERS, request.paramAsStrings(IssueFilterParameters.REPORTERS));
addMandatoryFacetValues(results, IssueFilterParameters.RULES, request.paramAsStrings(IssueFilterParameters.RULES));
addMandatoryFacetValues(results, IssueFilterParameters.LANGUAGES, request.paramAsStrings(IssueFilterParameters.LANGUAGES));
@@ -574,7 +574,7 @@ public class SearchAction implements BaseIssuesWsAction {
private void writeIssueComments(Collection issueComments, Map usersByLogin, JsonWriter json) {
if (!issueComments.isEmpty()) {
json.name("comments").beginArray();
- String login = userSession.login();
+ String login = userSession.getLogin();
for (IssueComment comment : issueComments) {
String userLogin = comment.userLogin();
User user = userLogin != null ? usersByLogin.get(userLogin) : null;
diff --git a/server/sonar-server/src/main/java/org/sonar/server/qualityprofile/QProfileProjectLookup.java b/server/sonar-server/src/main/java/org/sonar/server/qualityprofile/QProfileProjectLookup.java
index 31b4ca2c400..a4ca8e3f1be 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/qualityprofile/QProfileProjectLookup.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/qualityprofile/QProfileProjectLookup.java
@@ -60,7 +60,7 @@ public class QProfileProjectLookup {
}
List result = Lists.newArrayList();
- Collection authorizedProjectKeys = db.authorizationDao().selectAuthorizedRootProjectsKeys(userSession.userId(), UserRole.USER);
+ Collection authorizedProjectKeys = db.authorizationDao().selectAuthorizedRootProjectsKeys(userSession.getUserId(), UserRole.USER);
for (Map.Entry entry : componentsByKeys.entrySet()) {
if (authorizedProjectKeys.contains(entry.getKey())) {
result.add(entry.getValue());
diff --git a/server/sonar-server/src/main/java/org/sonar/server/qualityprofile/ws/QProfileProjectsAction.java b/server/sonar-server/src/main/java/org/sonar/server/qualityprofile/ws/QProfileProjectsAction.java
index 7b9f8cbf516..aabf7126c45 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/qualityprofile/ws/QProfileProjectsAction.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/qualityprofile/ws/QProfileProjectsAction.java
@@ -118,7 +118,7 @@ public class QProfileProjectsAction implements BaseQProfileWsAction {
}
});
- final Collection authorizedProjectIds = dbClient.authorizationDao().keepAuthorizedProjectIds(session, projectIds, userSession.userId(), UserRole.USER);
+ final Collection authorizedProjectIds = dbClient.authorizationDao().keepAuthorizedProjectIds(session, projectIds, userSession.getUserId(), UserRole.USER);
Iterable authorizedProjects = Iterables.filter(projects, new Predicate() {
@Override
public boolean apply(ProjectQprofileAssociationDto input) {
diff --git a/server/sonar-server/src/main/java/org/sonar/server/rule/RuleUpdater.java b/server/sonar-server/src/main/java/org/sonar/server/rule/RuleUpdater.java
index 4e715408d05..e9e2200f6d8 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/rule/RuleUpdater.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/rule/RuleUpdater.java
@@ -252,7 +252,7 @@ public class RuleUpdater {
context.rule.setNoteData(update.getMarkdownNote());
context.rule.setNoteCreatedAt(context.rule.getNoteCreatedAt() != null ? context.rule.getNoteCreatedAt() : now);
context.rule.setNoteUpdatedAt(now);
- context.rule.setNoteUserLogin(userSession.login());
+ context.rule.setNoteUserLogin(userSession.getLogin());
}
}
diff --git a/server/sonar-server/src/main/java/org/sonar/server/search/QueryContext.java b/server/sonar-server/src/main/java/org/sonar/server/search/QueryContext.java
index 8e24491b345..cc881eee494 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/search/QueryContext.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/search/QueryContext.java
@@ -51,8 +51,8 @@ public class QueryContext {
private Set userGroups = newHashSet();
public QueryContext(UserSession userSession) {
- this.userLogin = userSession.login();
- this.userGroups = userSession.userGroups();
+ this.userLogin = userSession.getLogin();
+ this.userGroups = userSession.getUserGroups();
}
/**
diff --git a/server/sonar-server/src/main/java/org/sonar/server/ui/ws/ComponentNavigationAction.java b/server/sonar-server/src/main/java/org/sonar/server/ui/ws/ComponentNavigationAction.java
index 75fdda425da..dfa22076e81 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/ui/ws/ComponentNavigationAction.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/ui/ws/ComponentNavigationAction.java
@@ -136,7 +136,7 @@ public class ComponentNavigationAction implements NavigationAction {
.prop("canBeFavorite", userSession.isLoggedIn())
.prop("isFavorite", isFavourite(session, component, userSession));
- List dashboards = activeDashboardDao.selectProjectDashboardsForUserLogin(session, userSession.login());
+ List dashboards = activeDashboardDao.selectProjectDashboardsForUserLogin(session, userSession.getLogin());
if (dashboards.isEmpty()) {
dashboards = activeDashboardDao.selectProjectDashboardsForUserLogin(session, ANONYMOUS);
}
@@ -153,7 +153,7 @@ public class ComponentNavigationAction implements NavigationAction {
private boolean isFavourite(DbSession session, ComponentDto component, UserSession userSession) {
PropertyQuery propertyQuery = PropertyQuery.builder()
- .setUserId(userSession.userId())
+ .setUserId(userSession.getUserId())
.setKey("favourite")
.setComponentId(component.getId())
.build();
diff --git a/server/sonar-server/src/main/java/org/sonar/server/ui/ws/GlobalNavigationAction.java b/server/sonar-server/src/main/java/org/sonar/server/ui/ws/GlobalNavigationAction.java
index 95f7a80f502..3c8ae6b9a36 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/ui/ws/GlobalNavigationAction.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/ui/ws/GlobalNavigationAction.java
@@ -65,7 +65,7 @@ public class GlobalNavigationAction implements NavigationAction {
@Override
public void handle(Request request, Response response) throws Exception {
- List dashboards = activeDashboardDao.selectGlobalDashboardsForUserLogin(userSession.login());
+ List dashboards = activeDashboardDao.selectGlobalDashboardsForUserLogin(userSession.getLogin());
if (dashboards.isEmpty()) {
dashboards = activeDashboardDao.selectGlobalDashboardsForUserLogin(ANONYMOUS);
}
diff --git a/server/sonar-server/src/main/java/org/sonar/server/user/AbstractUserSession.java b/server/sonar-server/src/main/java/org/sonar/server/user/AbstractUserSession.java
index e83ed9b046b..8c91da19730 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/user/AbstractUserSession.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/user/AbstractUserSession.java
@@ -60,7 +60,7 @@ public abstract class AbstractUserSession impleme
@Override
@CheckForNull
- public String login() {
+ public String getLogin() {
return login;
}
@@ -71,7 +71,7 @@ public abstract class AbstractUserSession impleme
@Override
@CheckForNull
- public String name() {
+ public String getName() {
return name;
}
@@ -82,7 +82,7 @@ public abstract class AbstractUserSession impleme
@Override
@CheckForNull
- public Integer userId() {
+ public Integer getUserId() {
return userId;
}
@@ -92,7 +92,7 @@ public abstract class AbstractUserSession impleme
}
@Override
- public Set userGroups() {
+ public Set getUserGroups() {
return userGroups;
}
diff --git a/server/sonar-server/src/main/java/org/sonar/server/user/DefaultUserService.java b/server/sonar-server/src/main/java/org/sonar/server/user/DefaultUserService.java
index 3655ee6661d..ac4aaeabf07 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/user/DefaultUserService.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/user/DefaultUserService.java
@@ -111,7 +111,7 @@ public class DefaultUserService implements RubyUserService {
throw new BadRequestException("Login is missing");
}
userSession.checkGlobalPermission(GlobalPermissions.SYSTEM_ADMIN);
- if (Objects.equal(userSession.login(), login)) {
+ if (Objects.equal(userSession.getLogin(), login)) {
throw new BadRequestException("Self-deactivation is not possible");
}
userUpdater.deactivateUserByLogin(login);
diff --git a/server/sonar-server/src/main/java/org/sonar/server/user/ThreadLocalUserSession.java b/server/sonar-server/src/main/java/org/sonar/server/user/ThreadLocalUserSession.java
index 2a8b84e1782..70fe607e913 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/user/ThreadLocalUserSession.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/user/ThreadLocalUserSession.java
@@ -51,25 +51,25 @@ public class ThreadLocalUserSession implements UserSession {
@Override
@CheckForNull
- public String login() {
- return get().login();
+ public String getLogin() {
+ return get().getLogin();
}
@Override
@CheckForNull
- public String name() {
- return get().name();
+ public String getName() {
+ return get().getName();
}
@Override
@CheckForNull
- public Integer userId() {
- return get().userId();
+ public Integer getUserId() {
+ return get().getUserId();
}
@Override
- public Set userGroups() {
- return get().userGroups();
+ public Set getUserGroups() {
+ return get().getUserGroups();
}
@Override
diff --git a/server/sonar-server/src/main/java/org/sonar/server/user/UserSession.java b/server/sonar-server/src/main/java/org/sonar/server/user/UserSession.java
index 9e683613dfd..64a7b3f6d0e 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/user/UserSession.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/user/UserSession.java
@@ -27,15 +27,15 @@ import javax.annotation.Nullable;
public interface UserSession {
@CheckForNull
- String login();
+ String getLogin();
@CheckForNull
- String name();
+ String getName();
@CheckForNull
- Integer userId();
+ Integer getUserId();
- Set userGroups();
+ Set getUserGroups();
boolean isLoggedIn();
diff --git a/server/sonar-server/src/main/java/org/sonar/server/user/ws/CurrentUserAction.java b/server/sonar-server/src/main/java/org/sonar/server/user/ws/CurrentUserAction.java
index 0b28b42bb75..037f5deb12f 100644
--- a/server/sonar-server/src/main/java/org/sonar/server/user/ws/CurrentUserAction.java
+++ b/server/sonar-server/src/main/java/org/sonar/server/user/ws/CurrentUserAction.java
@@ -54,8 +54,8 @@ public class CurrentUserAction implements BaseUsersWsAction {
private void writeUserDetails(JsonWriter json, UserSession session) {
json.prop("isLoggedIn", session.isLoggedIn())
- .prop("login", session.login())
- .prop("name", session.name());
+ .prop("login", session.getLogin())
+ .prop("name", session.getName());
writePermissions(json, session);
}
diff --git a/server/sonar-server/src/test/java/org/sonar/server/activity/ActivityServiceTest.java b/server/sonar-server/src/test/java/org/sonar/server/activity/ActivityServiceTest.java
index b4de673212e..c2bb32d8197 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/activity/ActivityServiceTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/activity/ActivityServiceTest.java
@@ -49,7 +49,7 @@ public class ActivityServiceTest {
@ClassRule
public static EsTester es = new EsTester().addDefinitions(new ActivityIndexDefinition(new Settings()));
@Rule
- public UserSessionRule userSession = UserSessionRule.standalone().logon();
+ public UserSessionRule userSession = UserSessionRule.standalone().login();
System2 system = mock(System2.class);
ActivityService service;
diff --git a/server/sonar-server/src/test/java/org/sonar/server/batch/IssuesActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/batch/IssuesActionTest.java
index 691cd7802f1..95ee7c4603e 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/batch/IssuesActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/batch/IssuesActionTest.java
@@ -125,7 +125,7 @@ public class IssuesActionTest {
.setChecksum(null)
.setAssignee(null));
- userSessionRule.logon("henry").setGlobalPermissions(GlobalPermissions.PREVIEW_EXECUTION);
+ userSessionRule.login("henry").setGlobalPermissions(GlobalPermissions.PREVIEW_EXECUTION);
WsTester.TestRequest request = tester.newGetRequest("batch", "issues").setParam("key", PROJECT_KEY);
@@ -164,7 +164,7 @@ public class IssuesActionTest {
.setChecksum("123456")
.setAssignee("john"));
- userSessionRule.logon("henry").setGlobalPermissions(GlobalPermissions.PREVIEW_EXECUTION);
+ userSessionRule.login("henry").setGlobalPermissions(GlobalPermissions.PREVIEW_EXECUTION);
WsTester.TestRequest request = tester.newGetRequest("batch", "issues").setParam("key", PROJECT_KEY);
@@ -203,7 +203,7 @@ public class IssuesActionTest {
.setChecksum("123456")
.setAssignee("john"));
- userSessionRule.logon("henry").setGlobalPermissions(GlobalPermissions.PREVIEW_EXECUTION);
+ userSessionRule.login("henry").setGlobalPermissions(GlobalPermissions.PREVIEW_EXECUTION);
WsTester.TestRequest request = tester.newGetRequest("batch", "issues").setParam("key", MODULE_KEY);
ServerIssue serverIssue = ServerIssue.parseDelimitedFrom(new ByteArrayInputStream(request.execute().output()));
@@ -241,7 +241,7 @@ public class IssuesActionTest {
.setChecksum("123456")
.setAssignee("john"));
- userSessionRule.logon("henry").setGlobalPermissions(GlobalPermissions.PREVIEW_EXECUTION);
+ userSessionRule.login("henry").setGlobalPermissions(GlobalPermissions.PREVIEW_EXECUTION);
WsTester.TestRequest request = tester.newGetRequest("batch", "issues").setParam("key", FILE_KEY);
ServerIssue serverIssue = ServerIssue.parseDelimitedFrom(new ByteArrayInputStream(request.execute().output()));
@@ -278,7 +278,7 @@ public class IssuesActionTest {
.setChecksum("123456")
.setAssignee("john"));
- userSessionRule.logon("henry").setGlobalPermissions(GlobalPermissions.PREVIEW_EXECUTION);
+ userSessionRule.login("henry").setGlobalPermissions(GlobalPermissions.PREVIEW_EXECUTION);
WsTester.TestRequest request = tester.newGetRequest("batch", "issues").setParam("key", MODULE_KEY);
ServerIssue previousIssue = ServerIssue.parseDelimitedFrom(new ByteArrayInputStream(request.execute().output()));
@@ -317,7 +317,7 @@ public class IssuesActionTest {
.setChecksum("123456")
.setAssignee("john"));
- userSessionRule.logon("henry").setGlobalPermissions(GlobalPermissions.PREVIEW_EXECUTION);
+ userSessionRule.login("henry").setGlobalPermissions(GlobalPermissions.PREVIEW_EXECUTION);
WsTester.TestRequest request = tester.newGetRequest("batch", "issues").setParam("key", PROJECT_KEY);
ServerIssue serverIssue = ServerIssue.parseDelimitedFrom(new ByteArrayInputStream(request.execute().output()));
@@ -328,7 +328,7 @@ public class IssuesActionTest {
@Test(expected = ForbiddenException.class)
public void fail_without_preview_permission() throws Exception {
- userSessionRule.logon("henry").setGlobalPermissions(GlobalPermissions.PROVISIONING);
+ userSessionRule.login("henry").setGlobalPermissions(GlobalPermissions.PROVISIONING);
WsTester.TestRequest request = tester.newGetRequest("batch", "issues").setParam("key", PROJECT_KEY);
request.execute();
diff --git a/server/sonar-server/src/test/java/org/sonar/server/batch/ProjectRepositoryLoaderMediumTest.java b/server/sonar-server/src/test/java/org/sonar/server/batch/ProjectRepositoryLoaderMediumTest.java
index d3901cf98fd..8b1e5e25166 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/batch/ProjectRepositoryLoaderMediumTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/batch/ProjectRepositoryLoaderMediumTest.java
@@ -89,7 +89,7 @@ public class ProjectRepositoryLoaderMediumTest {
@Test
public void return_project_settings() {
ComponentDto project = ComponentTesting.newProjectDto();
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
tester.get(DbClient.class).componentDao().insert(dbSession, project);
addDefaultProfile();
@@ -113,7 +113,7 @@ public class ProjectRepositoryLoaderMediumTest {
@Test
public void not_returned_secured_settings_with_only_preview_permission() {
ComponentDto project = ComponentTesting.newProjectDto();
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.PREVIEW_EXECUTION).addProjectUuidPermissions(UserRole.USER, project.uuid());
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.PREVIEW_EXECUTION).addProjectUuidPermissions(UserRole.USER, project.uuid());
tester.get(DbClient.class).componentDao().insert(dbSession, project);
addDefaultProfile();
@@ -136,7 +136,7 @@ public class ProjectRepositoryLoaderMediumTest {
@Test
public void return_project_with_module_settings() {
ComponentDto project = ComponentTesting.newProjectDto();
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
tester.get(DbClient.class).componentDao().insert(dbSession, project);
addDefaultProfile();
@@ -172,7 +172,7 @@ public class ProjectRepositoryLoaderMediumTest {
@Test
public void return_project_with_module_settings_inherited_from_project() {
ComponentDto project = ComponentTesting.newProjectDto();
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
tester.get(DbClient.class).componentDao().insert(dbSession, project);
addDefaultProfile();
@@ -203,7 +203,7 @@ public class ProjectRepositoryLoaderMediumTest {
@Test
public void return_project_with_module_with_sub_module() {
ComponentDto project = ComponentTesting.newProjectDto();
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
tester.get(DbClient.class).componentDao().insert(dbSession, project);
addDefaultProfile();
@@ -251,7 +251,7 @@ public class ProjectRepositoryLoaderMediumTest {
@Test
public void return_project_with_two_modules() {
ComponentDto project = ComponentTesting.newProjectDto();
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
tester.get(DbClient.class).componentDao().insert(dbSession, project);
addDefaultProfile();
@@ -296,7 +296,7 @@ public class ProjectRepositoryLoaderMediumTest {
public void return_provisioned_project_settings() {
// No snapshot attached on the project -> provisioned project
ComponentDto project = ComponentTesting.newProjectDto();
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
tester.get(DbClient.class).componentDao().insert(dbSession, project);
addDefaultProfile();
@@ -326,7 +326,7 @@ public class ProjectRepositoryLoaderMediumTest {
// No module properties
ComponentDto subModule = ComponentTesting.newModuleDto(module);
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
tester.get(DbClient.class).componentDao().insert(dbSession, subModule);
// Sub module properties
@@ -362,7 +362,7 @@ public class ProjectRepositoryLoaderMediumTest {
tester.get(DbClient.class).propertiesDao().setProperty(new PropertyDto().setKey("sonar.jira.login.secured").setValue("john").setResourceId(module.getId()), dbSession);
ComponentDto subModule = ComponentTesting.newModuleDto(module);
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
tester.get(DbClient.class).componentDao().insert(dbSession, subModule);
// Sub module properties
@@ -396,7 +396,7 @@ public class ProjectRepositoryLoaderMediumTest {
// No module property
ComponentDto subModule = ComponentTesting.newModuleDto(module);
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
tester.get(DbClient.class).componentDao().insert(dbSession, subModule);
// No sub module property
@@ -429,7 +429,7 @@ public class ProjectRepositoryLoaderMediumTest {
tester.get(DbClient.class).propertiesDao().setProperty(new PropertyDto().setKey("sonar.jira.project.key").setValue("SONAR-SERVER").setResourceId(module.getId()), dbSession);
ComponentDto subModule = ComponentTesting.newModuleDto(module);
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
tester.get(DbClient.class).componentDao().insert(dbSession, subModule);
// No sub module property
@@ -450,7 +450,7 @@ public class ProjectRepositoryLoaderMediumTest {
Date ruleUpdatedAt = DateUtils.parseDateTime("2014-01-14T13:00:00+0100");
ComponentDto project = ComponentTesting.newProjectDto();
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
tester.get(DbClient.class).componentDao().insert(dbSession, project);
QualityProfileDto profileDto = QProfileTesting.newDto(QProfileName.createFor(ServerTester.Xoo.KEY, "SonarQube way"), "abcd").setRulesUpdatedAt(
@@ -474,7 +474,7 @@ public class ProjectRepositoryLoaderMediumTest {
Date ruleUpdatedAt = DateUtils.parseDateTime("2014-01-14T13:00:00+0100");
ComponentDto project = ComponentTesting.newProjectDto();
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
tester.get(DbClient.class).componentDao().insert(dbSession, project);
QualityProfileDto profileDto = QProfileTesting.newDto(QProfileName.createFor(ServerTester.Xoo.KEY, "SonarQube way"), "abcd").setRulesUpdatedAt(
@@ -497,7 +497,7 @@ public class ProjectRepositoryLoaderMediumTest {
Date ruleUpdatedAt = DateUtils.parseDateTime("2014-01-14T13:00:00+0100");
ComponentDto project = ComponentTesting.newProjectDto();
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
tester.get(DbClient.class).componentDao().insert(dbSession, project);
QualityProfileDto profileDto = QProfileTesting.newDto(QProfileName.createFor(ServerTester.Xoo.KEY, "SonarQube way"), "abcd").setRulesUpdatedAt(
@@ -517,7 +517,7 @@ public class ProjectRepositoryLoaderMediumTest {
@Test
public void return_quality_profiles_even_when_project_does_not_exists() {
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
Date ruleUpdatedAt = DateUtils.parseDateTime("2014-01-14T13:00:00+0100");
QualityProfileDto profileDto = QProfileTesting.newDto(QProfileName.createFor(ServerTester.Xoo.KEY, "SonarQube way"), "abcd").setRulesUpdatedAt(
@@ -541,7 +541,7 @@ public class ProjectRepositoryLoaderMediumTest {
// No snapshot attached on the project -> provisioned project
ComponentDto project = ComponentTesting.newProjectDto();
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
tester.get(DbClient.class).componentDao().insert(dbSession, project);
QualityProfileDto profileDto = QProfileTesting.newDto(QProfileName.createFor(ServerTester.Xoo.KEY, "SonarQube way"), "abcd").setRulesUpdatedAt(
@@ -563,7 +563,7 @@ public class ProjectRepositoryLoaderMediumTest {
@Test
public void fail_when_no_quality_profile_for_a_language() {
ComponentDto project = ComponentTesting.newProjectDto().setKey("org.codehaus.sonar:sonar");
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
tester.get(DbClient.class).componentDao().insert(dbSession, project);
dbSession.commit();
@@ -578,7 +578,7 @@ public class ProjectRepositoryLoaderMediumTest {
@Test
public void return_active_rules() {
ComponentDto project = ComponentTesting.newProjectDto();
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
tester.get(DbClient.class).componentDao().insert(dbSession, project);
QualityProfileDto profileDto = QProfileTesting.newDto(QProfileName.createFor(ServerTester.Xoo.KEY, "SonarQube way"), "abcd").setRulesUpdatedAt(
@@ -613,7 +613,7 @@ public class ProjectRepositoryLoaderMediumTest {
@Test
public void return_only_active_rules_from_project_profile() {
ComponentDto project = ComponentTesting.newProjectDto();
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
tester.get(DbClient.class).componentDao().insert(dbSession, project);
RuleKey ruleKey1 = RuleKey.of("squid", "AvoidCycle");
@@ -651,7 +651,7 @@ public class ProjectRepositoryLoaderMediumTest {
@Test
public void return_more_than_10_active_rules() {
ComponentDto project = ComponentTesting.newProjectDto();
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
tester.get(DbClient.class).componentDao().insert(dbSession, project);
QualityProfileDto profileDto = QProfileTesting.newDto(QProfileName.createFor(ServerTester.Xoo.KEY, "SonarQube way"), "abcd")
@@ -675,7 +675,7 @@ public class ProjectRepositoryLoaderMediumTest {
Date ruleUpdatedAt = DateUtils.parseDateTime("2014-01-14T13:00:00+0100");
ComponentDto project = ComponentTesting.newProjectDto();
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
tester.get(DbClient.class).componentDao().insert(dbSession, project);
QualityProfileDto profileDto = QProfileTesting.newDto(QProfileName.createFor(ServerTester.Xoo.KEY, "SonarQube way"), "abcd").setRulesUpdatedAt(
@@ -705,7 +705,7 @@ public class ProjectRepositoryLoaderMediumTest {
@Test
public void return_manual_rules() {
ComponentDto project = ComponentTesting.newProjectDto();
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
tester.get(DbClient.class).componentDao().insert(dbSession, project);
addDefaultProfile();
@@ -725,7 +725,7 @@ public class ProjectRepositoryLoaderMediumTest {
@Test
public void fail_if_no_permission() {
- userSessionRule.logon("john").setGlobalPermissions();
+ userSessionRule.login("john").setGlobalPermissions();
ComponentDto project = ComponentTesting.newProjectDto();
tester.get(DbClient.class).componentDao().insert(dbSession, project);
@@ -741,7 +741,7 @@ public class ProjectRepositoryLoaderMediumTest {
@Test
public void fail_when_not_preview_and_only_dry_run_permission() {
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.PREVIEW_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.PREVIEW_EXECUTION);
ComponentDto project = ComponentTesting.newProjectDto();
tester.get(DbClient.class).componentDao().insert(dbSession, project);
@@ -760,7 +760,7 @@ public class ProjectRepositoryLoaderMediumTest {
@Test
public void return_file_data_from_single_project() {
ComponentDto project = ComponentTesting.newProjectDto();
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
tester.get(DbClient.class).componentDao().insert(dbSession, project);
addDefaultProfile();
@@ -779,7 +779,7 @@ public class ProjectRepositoryLoaderMediumTest {
@Test
public void return_file_data_from_multi_modules() {
ComponentDto project = ComponentTesting.newProjectDto();
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
tester.get(DbClient.class).componentDao().insert(dbSession, project);
addDefaultProfile();
@@ -815,7 +815,7 @@ public class ProjectRepositoryLoaderMediumTest {
tester.get(FileSourceDao.class).insert(newFileSourceDto(projectFile).setSrcHash("123456"));
ComponentDto module = ComponentTesting.newModuleDto(project);
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
tester.get(DbClient.class).componentDao().insert(dbSession, module);
// File on module
diff --git a/server/sonar-server/src/test/java/org/sonar/server/batch/UsersActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/batch/UsersActionTest.java
index b7ef762d0fb..43c000cafae 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/batch/UsersActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/batch/UsersActionTest.java
@@ -69,7 +69,7 @@ public class UsersActionTest {
new UserDoc().setLogin("ada.lovelace").setName("Ada Lovelace").setActive(false),
new UserDoc().setLogin("grace.hopper").setName("Grace Hopper").setActive(true));
- userSessionRule.logon("sonarqtech").setGlobalPermissions(GlobalPermissions.PREVIEW_EXECUTION);
+ userSessionRule.login("sonarqtech").setGlobalPermissions(GlobalPermissions.PREVIEW_EXECUTION);
WsTester.TestRequest request = tester.newGetRequest("batch", "users").setParam("logins", "ada.lovelace,grace.hopper");
diff --git a/server/sonar-server/src/test/java/org/sonar/server/component/ComponentCleanerServiceMediumTest.java b/server/sonar-server/src/test/java/org/sonar/server/component/ComponentCleanerServiceMediumTest.java
index 4ef69979085..e1d3b0dbfb8 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/component/ComponentCleanerServiceMediumTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/component/ComponentCleanerServiceMediumTest.java
@@ -95,7 +95,7 @@ public class ComponentCleanerServiceMediumTest {
// project can be seen by anyone
session.commit();
- userSessionRule.logon("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
+ userSessionRule.login("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
tester.get(InternalPermissionService.class).addPermission(new PermissionChange().setComponentKey(project.getKey()).setGroup(DefaultGroups.ANYONE).setPermission(UserRole.USER));
assertThat(countIssueAuthorizationDocs()).isEqualTo(1);
diff --git a/server/sonar-server/src/test/java/org/sonar/server/component/ComponentServiceMediumTest.java b/server/sonar-server/src/test/java/org/sonar/server/component/ComponentServiceMediumTest.java
index e3176625da2..0c70e06c6ee 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/component/ComponentServiceMediumTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/component/ComponentServiceMediumTest.java
@@ -110,7 +110,7 @@ public class ComponentServiceMediumTest {
session.commit();
- userSessionRule.logon("john").addProjectUuidPermissions(UserRole.ADMIN, project.uuid());
+ userSessionRule.login("john").addProjectUuidPermissions(UserRole.ADMIN, project.uuid());
service.updateKey(project.key(), "sample2:root");
session.commit();
@@ -134,7 +134,7 @@ public class ComponentServiceMediumTest {
session.commit();
- userSessionRule.logon("john").addProjectUuidPermissions(UserRole.ADMIN, project.uuid());
+ userSessionRule.login("john").addProjectUuidPermissions(UserRole.ADMIN, project.uuid());
service.updateKey(module.key(), "sample:root2:module");
session.commit();
@@ -157,7 +157,7 @@ public class ComponentServiceMediumTest {
session.commit();
- userSessionRule.logon("john").addProjectUuidPermissions(UserRole.ADMIN, provisionedProject.uuid());
+ userSessionRule.login("john").addProjectUuidPermissions(UserRole.ADMIN, provisionedProject.uuid());
service.updateKey(provisionedProject.key(), "provisionedProject2");
session.commit();
@@ -169,7 +169,7 @@ public class ComponentServiceMediumTest {
@Test(expected = ForbiddenException.class)
public void fail_to_update_project_key_without_admin_permission() {
ComponentDto project = createProject("sample:root");
- userSessionRule.logon("john").addProjectUuidPermissions(UserRole.USER, project.uuid());
+ userSessionRule.login("john").addProjectUuidPermissions(UserRole.USER, project.uuid());
service.updateKey(project.key(), "sample2:root");
}
@@ -184,7 +184,7 @@ public class ComponentServiceMediumTest {
session.commit();
- userSessionRule.logon("john").addProjectUuidPermissions(UserRole.ADMIN, project.uuid());
+ userSessionRule.login("john").addProjectUuidPermissions(UserRole.ADMIN, project.uuid());
Map result = service.checkModuleKeysBeforeRenaming(project.key(), "sample", "sample2");
assertThat(result).hasSize(2);
@@ -203,7 +203,7 @@ public class ComponentServiceMediumTest {
session.commit();
- userSessionRule.logon("john").addProjectUuidPermissions(UserRole.ADMIN, project.uuid());
+ userSessionRule.login("john").addProjectUuidPermissions(UserRole.ADMIN, project.uuid());
Map result = service.checkModuleKeysBeforeRenaming(project.key(), "sample:root", "foo");
assertThat(result).hasSize(2);
@@ -214,7 +214,7 @@ public class ComponentServiceMediumTest {
@Test(expected = ForbiddenException.class)
public void fail_to_check_module_keys_before_renaming_without_admin_permission() {
ComponentDto project = createProject("sample:root");
- userSessionRule.logon("john").addProjectUuidPermissions(UserRole.USER, project.uuid());
+ userSessionRule.login("john").addProjectUuidPermissions(UserRole.USER, project.uuid());
service.checkModuleKeysBeforeRenaming(project.key(), "sample", "sample2");
}
@@ -229,7 +229,7 @@ public class ComponentServiceMediumTest {
session.commit();
- userSessionRule.logon("john").addProjectUuidPermissions(UserRole.ADMIN, project.uuid());
+ userSessionRule.login("john").addProjectUuidPermissions(UserRole.ADMIN, project.uuid());
service.bulkUpdateKey(project.key(), "sample", "sample2");
session.commit();
@@ -253,7 +253,7 @@ public class ComponentServiceMediumTest {
session.commit();
- userSessionRule.logon("john").addProjectUuidPermissions(UserRole.ADMIN, provisionedProject.uuid());
+ userSessionRule.login("john").addProjectUuidPermissions(UserRole.ADMIN, provisionedProject.uuid());
service.bulkUpdateKey(provisionedProject.key(), "provisionedProject", "provisionedProject2");
session.commit();
@@ -265,14 +265,14 @@ public class ComponentServiceMediumTest {
@Test(expected = ForbiddenException.class)
public void fail_to_bulk_update_project_key_without_admin_permission() {
ComponentDto project = createProject("sample:root");
- userSessionRule.logon("john").addProjectPermissions(UserRole.USER, project.key());
+ userSessionRule.login("john").addProjectPermissions(UserRole.USER, project.key());
service.bulkUpdateKey("sample:root", "sample", "sample2");
}
@Test
public void create_project() {
executeStartupTasksToCreateDefaultPermissionTemplate();
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.PROVISIONING);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.PROVISIONING);
String key = service.create(NewComponent.create("struts", "Struts project"));
@@ -293,7 +293,7 @@ public class ComponentServiceMediumTest {
@Test
public void create_new_project_with_branch() {
executeStartupTasksToCreateDefaultPermissionTemplate();
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.PROVISIONING);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.PROVISIONING);
String key = service.create(NewComponent.create("struts", "Struts project").setBranch("origin/branch"));
@@ -305,7 +305,7 @@ public class ComponentServiceMediumTest {
@Test
public void create_view() {
executeStartupTasksToCreateDefaultPermissionTemplate();
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.PROVISIONING);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.PROVISIONING);
String key = service.create(NewComponent.create("all-project", "All Projects").setQualifier(Qualifiers.VIEW));
@@ -325,7 +325,7 @@ public class ComponentServiceMediumTest {
@Test
public void fail_to_create_new_component_on_invalid_key() {
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.PROVISIONING);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.PROVISIONING);
try {
service.create(NewComponent.create("struts?parent", "Struts project"));
@@ -338,7 +338,7 @@ public class ComponentServiceMediumTest {
@Test
public void fail_to_create_new_component_on_invalid_branch() {
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.PROVISIONING);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.PROVISIONING);
try {
service.create(NewComponent.create("struts", "Struts project").setBranch("origin?branch"));
@@ -351,7 +351,7 @@ public class ComponentServiceMediumTest {
@Test
public void fail_to_create_new_component_if_key_already_exists() {
- userSessionRule.logon("john").setGlobalPermissions(GlobalPermissions.PROVISIONING);
+ userSessionRule.login("john").setGlobalPermissions(GlobalPermissions.PROVISIONING);
ComponentDto project = ComponentTesting.newProjectDto().setKey("struts");
tester.get(ComponentDao.class).insert(session, project);
@@ -408,7 +408,7 @@ public class ComponentServiceMediumTest {
session.commit();
// project can be seen by anyone
- userSessionRule.logon("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
+ userSessionRule.login("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
tester.get(InternalPermissionService.class).addPermission(new PermissionChange().setComponentKey(project.getKey()).setGroup(DefaultGroups.ANYONE).setPermission(UserRole.USER));
return project;
diff --git a/server/sonar-server/src/test/java/org/sonar/server/component/ws/ComponentAppActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/component/ws/ComponentAppActionTest.java
index 81b374179f5..815f60ca464 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/component/ws/ComponentAppActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/component/ws/ComponentAppActionTest.java
@@ -109,7 +109,7 @@ public class ComponentAppActionTest {
@Test
public void app() throws Exception {
- userSessionRule.logon("john").addComponentPermission(UserRole.USER, SUB_PROJECT_KEY, COMPONENT_KEY);
+ userSessionRule.login("john").addComponentPermission(UserRole.USER, SUB_PROJECT_KEY, COMPONENT_KEY);
ComponentDto project = newProject();
ComponentDto file = ComponentTesting.newFileDto(project)
@@ -194,7 +194,7 @@ public class ComponentAppActionTest {
@Test
public void fail_on_unknown_component() {
- userSessionRule.logon("john").addComponentPermission(UserRole.USER, SUB_PROJECT_KEY, COMPONENT_KEY);
+ userSessionRule.login("john").addComponentPermission(UserRole.USER, SUB_PROJECT_KEY, COMPONENT_KEY);
when(componentDao.getNullableByUuid(session, COMPONENT_UUID)).thenReturn(null);
try {
diff --git a/server/sonar-server/src/test/java/org/sonar/server/component/ws/SearchActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/component/ws/SearchActionTest.java
index 6a13468a02e..c63ff362391 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/component/ws/SearchActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/component/ws/SearchActionTest.java
@@ -61,7 +61,7 @@ public class SearchActionTest {
@Test
public void return_projects_from_view() throws Exception {
dbTester.prepareDbUnit(getClass(), "shared.xml");
- userSessionRule.logon("john").addProjectUuidPermissions(UserRole.USER, "EFGH");
+ userSessionRule.login("john").addProjectUuidPermissions(UserRole.USER, "EFGH");
WsTester.TestRequest request = tester.newGetRequest("api/components", "search").setParam("componentUuid", "EFGH").setParam("q", "st");
request.execute().assertJson(getClass(), "return_projects_from_view.json");
@@ -70,7 +70,7 @@ public class SearchActionTest {
@Test
public void return_projects_from_subview() throws Exception {
dbTester.prepareDbUnit(getClass(), "shared.xml");
- userSessionRule.logon("john").addComponentUuidPermission(UserRole.USER, "EFGH", "FGHI");
+ userSessionRule.login("john").addComponentUuidPermission(UserRole.USER, "EFGH", "FGHI");
WsTester.TestRequest request = tester.newGetRequest("api/components", "search").setParam("componentUuid", "FGHI").setParam("q", "st");
request.execute().assertJson(getClass(), "return_projects_from_subview.json");
@@ -79,7 +79,7 @@ public class SearchActionTest {
@Test
public void return_only_authorized_projects_from_view() throws Exception {
dbTester.prepareDbUnit(getClass(), "return_only_authorized_projects_from_view.xml");
- userSessionRule.logon("john").addProjectUuidPermissions(UserRole.USER, "EFGH");
+ userSessionRule.login("john").addProjectUuidPermissions(UserRole.USER, "EFGH");
WsTester.TestRequest request = tester.newGetRequest("api/components", "search").setParam("componentUuid", "EFGH").setParam("q", "st");
request.execute().assertJson(getClass(), "return_only_authorized_projects_from_view.json");
@@ -88,7 +88,7 @@ public class SearchActionTest {
@Test
public void return_paged_result() throws Exception {
dbTester.prepareDbUnit(getClass(), "shared.xml");
- userSessionRule.logon("john").addProjectUuidPermissions(UserRole.USER, "EFGH");
+ userSessionRule.login("john").addProjectUuidPermissions(UserRole.USER, "EFGH");
WsTester.TestRequest request = tester.newGetRequest("api/components", "search").setParam("componentUuid", "EFGH").setParam("q", "st").setParam("p", "2").setParam("ps", "1");
request.execute().assertJson(getClass(), "return_paged_result.json");
@@ -97,7 +97,7 @@ public class SearchActionTest {
@Test
public void return_only_first_page() throws Exception {
dbTester.prepareDbUnit(getClass(), "shared.xml");
- userSessionRule.logon("john").addProjectUuidPermissions(UserRole.USER, "EFGH");
+ userSessionRule.login("john").addProjectUuidPermissions(UserRole.USER, "EFGH");
WsTester.TestRequest request = tester.newGetRequest("api/components", "search").setParam("componentUuid", "EFGH").setParam("q", "st").setParam("p", "1").setParam("ps", "1");
request.execute().assertJson(getClass(), "return_only_first_page.json");
@@ -106,7 +106,7 @@ public class SearchActionTest {
@Test
public void fail_when_search_param_is_too_short() throws Exception {
dbTester.prepareDbUnit(getClass(), "shared.xml");
- userSessionRule.logon("john").addProjectUuidPermissions(UserRole.USER, "EFGH");
+ userSessionRule.login("john").addProjectUuidPermissions(UserRole.USER, "EFGH");
WsTester.TestRequest request = tester.newGetRequest("api/components", "search").setParam("componentUuid", "EFGH").setParam("q", "s");
diff --git a/server/sonar-server/src/test/java/org/sonar/server/issue/ActionServiceTest.java b/server/sonar-server/src/test/java/org/sonar/server/issue/ActionServiceTest.java
index d94ff01ccd5..da1d066b796 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/issue/ActionServiceTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/issue/ActionServiceTest.java
@@ -110,7 +110,7 @@ public class ActionServiceTest {
Function function = new TweetFunction();
UserSession userSession = mock(ThreadLocalUserSession.class);
- when(userSession.login()).thenReturn("arthur");
+ when(userSession.getLogin()).thenReturn("arthur");
when(componentDao.getByKey(eq(session), anyString())).thenReturn(mock(ComponentDto.class));
when(issueService.getByKeyForUpdate(session, "ABCD")).thenReturn(issue);
@@ -127,7 +127,7 @@ public class ActionServiceTest {
Function function = new TweetFunction();
UserSession userSession = mock(ThreadLocalUserSession.class);
- when(userSession.login()).thenReturn("arthur");
+ when(userSession.getLogin()).thenReturn("arthur");
when(componentDao.getByKey(session, "struts")).thenReturn(new ComponentDto().setKey("struts"));
when(issueService.getByKeyForUpdate(session, "ABCD")).thenReturn(issue.setProjectKey("struts"));
diff --git a/server/sonar-server/src/test/java/org/sonar/server/issue/IssueBulkChangeServiceMediumTest.java b/server/sonar-server/src/test/java/org/sonar/server/issue/IssueBulkChangeServiceMediumTest.java
index 6a6065e547c..bf6b9e8a2e4 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/issue/IssueBulkChangeServiceMediumTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/issue/IssueBulkChangeServiceMediumTest.java
@@ -96,10 +96,10 @@ public class IssueBulkChangeServiceMediumTest {
// project can be seen by anyone
session.commit();
- userSessionRule.logon("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
+ userSessionRule.login("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
tester.get(InternalPermissionService.class).addPermission(new PermissionChange().setComponentKey(project.getKey()).setGroup(DefaultGroups.ANYONE).setPermission(UserRole.USER));
- userSession = userSessionRule.logon("john")
+ userSession = userSessionRule.login("john")
.addProjectPermissions(UserRole.USER, project.key());
}
diff --git a/server/sonar-server/src/test/java/org/sonar/server/issue/IssueChangelogServiceTest.java b/server/sonar-server/src/test/java/org/sonar/server/issue/IssueChangelogServiceTest.java
index 914e2584e2c..7723f024513 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/issue/IssueChangelogServiceTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/issue/IssueChangelogServiceTest.java
@@ -87,7 +87,7 @@ public class IssueChangelogServiceTest {
@Test
public void format_diffs() {
FieldDiffs diffs = new FieldDiffs().setUserLogin("arthur").setDiff("severity", "MAJOR", "BLOCKER");
- userSessionRule.logon();
+ userSessionRule.login();
service.formatDiffs(diffs);
verify(formatter).format(any(Locale.class), eq(diffs));
}
diff --git a/server/sonar-server/src/test/java/org/sonar/server/issue/IssueCommentServiceMediumTest.java b/server/sonar-server/src/test/java/org/sonar/server/issue/IssueCommentServiceMediumTest.java
index 2eb0a147625..f3978d66bf0 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/issue/IssueCommentServiceMediumTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/issue/IssueCommentServiceMediumTest.java
@@ -93,10 +93,10 @@ public class IssueCommentServiceMediumTest {
// project can be seen by anyone
session.commit();
- userSessionRule.logon("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
+ userSessionRule.login("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
tester.get(InternalPermissionService.class).addPermission(new PermissionChange().setComponentKey(project.getKey()).setGroup(DefaultGroups.ANYONE).setPermission(UserRole.USER));
- userSessionRule.logon("gandalf");
+ userSessionRule.login("gandalf");
session.commit();
}
diff --git a/server/sonar-server/src/test/java/org/sonar/server/issue/IssueCommentServiceTest.java b/server/sonar-server/src/test/java/org/sonar/server/issue/IssueCommentServiceTest.java
index 456a53d0a6e..49f18628b80 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/issue/IssueCommentServiceTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/issue/IssueCommentServiceTest.java
@@ -80,7 +80,7 @@ public class IssueCommentServiceTest {
@Rule
public ExpectedException throwable = ExpectedException.none();
@Rule
- public UserSessionRule userSessionRule = UserSessionRule.standalone().logon("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
+ public UserSessionRule userSessionRule = UserSessionRule.standalone().login("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
@Before
public void setUp() {
diff --git a/server/sonar-server/src/test/java/org/sonar/server/issue/IssueServiceMediumTest.java b/server/sonar-server/src/test/java/org/sonar/server/issue/IssueServiceMediumTest.java
index 494dc0f8597..47495438706 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/issue/IssueServiceMediumTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/issue/IssueServiceMediumTest.java
@@ -157,7 +157,7 @@ public class IssueServiceMediumTest {
RuleDto rule = newRule();
ComponentDto project = newProject();
ComponentDto file = newFile(project);
- userSessionRule.logon("john");
+ userSessionRule.login("john");
IssueDto issue = saveIssue(IssueTesting.newDto(rule, file, project).setStatus(Issue.STATUS_OPEN));
@@ -173,7 +173,7 @@ public class IssueServiceMediumTest {
RuleDto rule = newRule();
ComponentDto project = newProject();
ComponentDto file = newFile(project);
- userSessionRule.logon("john");
+ userSessionRule.login("john");
IssueDto issue = saveIssue(IssueTesting.newDto(rule, file, project));
@@ -194,7 +194,7 @@ public class IssueServiceMediumTest {
RuleDto rule = newRule();
ComponentDto project = newProject();
ComponentDto file = newFile(project);
- userSessionRule.logon("john");
+ userSessionRule.login("john");
IssueDto issue = saveIssue(IssueTesting.newDto(rule, file, project).setAssignee("perceval"));
@@ -215,7 +215,7 @@ public class IssueServiceMediumTest {
RuleDto rule = newRule();
ComponentDto project = newProject();
ComponentDto file = newFile(project);
- userSessionRule.logon("john");
+ userSessionRule.login("john");
IssueDto issue = saveIssue(IssueTesting.newDto(rule, file, project));
@@ -232,7 +232,7 @@ public class IssueServiceMediumTest {
RuleDto rule = newRule();
ComponentDto project = newProject();
ComponentDto file = newFile(project);
- userSessionRule.logon("john").addProjectPermissions(UserRole.USER, project.key());
+ userSessionRule.login("john").addProjectPermissions(UserRole.USER, project.key());
IssueDto issue = saveIssue(IssueTesting.newDto(rule, file, project));
@@ -253,7 +253,7 @@ public class IssueServiceMediumTest {
RuleDto rule = newRule();
ComponentDto project = newProject();
ComponentDto file = newFile(project);
- userSessionRule.logon("john");
+ userSessionRule.login("john");
String actionPlanKey = "EFGH";
db.actionPlanDao().save(new ActionPlanDto().setKey(actionPlanKey).setProjectId(project.getId()));
@@ -271,7 +271,7 @@ public class IssueServiceMediumTest {
RuleDto rule = newRule();
ComponentDto project = newProject();
ComponentDto file = newFile(project);
- userSessionRule.logon("john");
+ userSessionRule.login("john");
IssueDto issue = saveIssue(IssueTesting.newDto(rule, file, project));
try {
@@ -287,7 +287,7 @@ public class IssueServiceMediumTest {
RuleDto rule = newRule();
ComponentDto project = newProject();
ComponentDto file = newFile(project);
- userSessionRule.logon("john").addProjectPermissions(UserRole.ISSUE_ADMIN, project.key());
+ userSessionRule.login("john").addProjectPermissions(UserRole.ISSUE_ADMIN, project.key());
IssueDto issue = saveIssue(IssueTesting.newDto(rule, file, project).setSeverity(Severity.BLOCKER));
@@ -302,7 +302,7 @@ public class IssueServiceMediumTest {
public void create_manual_issue() {
ComponentDto project = newProject();
ComponentDto file = newFile(project);
- userSessionRule.logon("john").addProjectPermissions(UserRole.USER, project.key());
+ userSessionRule.login("john").addProjectPermissions(UserRole.USER, project.key());
RuleDto manualRule = RuleTesting.newManualRule("manualRuleKey");
tester.get(RuleDao.class).insert(session, manualRule);
@@ -328,7 +328,7 @@ public class IssueServiceMediumTest {
newSourceLine(file, 1, "arthur");
createDefaultGroup();
newUser("arthur");
- userSessionRule.logon("john").addProjectPermissions(UserRole.USER, project.key());
+ userSessionRule.login("john").addProjectPermissions(UserRole.USER, project.key());
RuleDto manualRule = RuleTesting.newManualRule("manualRuleKey");
tester.get(RuleDao.class).insert(session, manualRule);
@@ -352,7 +352,7 @@ public class IssueServiceMediumTest {
public void create_manual_issue_with_major_severity_when_no_severity() {
ComponentDto project = newProject();
ComponentDto file = newFile(project);
- userSessionRule.logon("john").addProjectPermissions(UserRole.USER, project.key());
+ userSessionRule.login("john").addProjectPermissions(UserRole.USER, project.key());
RuleDto manualRule = RuleTesting.newManualRule("manualRuleKey");
tester.get(RuleDao.class).insert(session, manualRule);
@@ -368,7 +368,7 @@ public class IssueServiceMediumTest {
public void create_manual_issue_with_rule_name_when_no_message() {
ComponentDto project = newProject();
ComponentDto file = newFile(project);
- userSessionRule.logon("john").addProjectPermissions(UserRole.USER, project.key());
+ userSessionRule.login("john").addProjectPermissions(UserRole.USER, project.key());
RuleDto manualRule = RuleTesting.newManualRule("manualRuleKey").setName("Manual rule name");
tester.get(RuleDao.class).insert(session, manualRule);
@@ -388,7 +388,7 @@ public class IssueServiceMediumTest {
newSourceLine(file, 1, "unknown");
createDefaultGroup();
newUser("arthur");
- userSessionRule.logon("john").addProjectPermissions(UserRole.USER, project.key());
+ userSessionRule.login("john").addProjectPermissions(UserRole.USER, project.key());
RuleDto manualRule = RuleTesting.newManualRule("manualRuleKey");
tester.get(RuleDao.class).insert(session, manualRule);
@@ -406,7 +406,7 @@ public class IssueServiceMediumTest {
ComponentDto file = newFile(project);
// No author on line 1
newSourceLine(file, 1, "");
- userSessionRule.logon("john").addProjectPermissions(UserRole.USER, project.key());
+ userSessionRule.login("john").addProjectPermissions(UserRole.USER, project.key());
RuleDto manualRule = RuleTesting.newManualRule("manualRuleKey");
tester.get(RuleDao.class).insert(session, manualRule);
@@ -423,7 +423,7 @@ public class IssueServiceMediumTest {
RuleDto rule = newRule();
ComponentDto project = newProject();
ComponentDto file = newFile(project);
- userSessionRule.logon("john").addProjectPermissions(UserRole.USER, project.key());
+ userSessionRule.login("john").addProjectPermissions(UserRole.USER, project.key());
try {
service.createManualIssue(file.key(), rule.getKey(), null, "Fix it", null, 2d);
@@ -437,7 +437,7 @@ public class IssueServiceMediumTest {
public void fail_create_manual_issue_if_rule_does_not_exists() {
ComponentDto project = newProject();
ComponentDto file = newFile(project);
- userSessionRule.logon("john").addProjectPermissions(UserRole.USER, project.key());
+ userSessionRule.login("john").addProjectPermissions(UserRole.USER, project.key());
service.createManualIssue(file.key(), RuleKey.of("rule", "unknown"), 10, "Fix it", null, 2d);
}
@@ -449,7 +449,7 @@ public class IssueServiceMediumTest {
ComponentDto file = newFile(project);
// User has not the 'user' role on the project
- userSessionRule.logon("john").addProjectPermissions(UserRole.CODEVIEWER, project.key());
+ userSessionRule.login("john").addProjectPermissions(UserRole.CODEVIEWER, project.key());
RuleDto manualRule = RuleTesting.newManualRule("manualRuleKey");
tester.get(RuleDao.class).insert(session, manualRule);
@@ -492,7 +492,7 @@ public class IssueServiceMediumTest {
RuleDto rule = newRule();
ComponentDto project = newProject();
ComponentDto file = newFile(project);
- userSessionRule.logon("john");
+ userSessionRule.login("john");
IssueDto issue = saveIssue(IssueTesting.newDto(rule, file, project));
@@ -570,12 +570,12 @@ public class IssueServiceMediumTest {
ComponentDto project = ComponentTesting.newProjectDto();
tester.get(ComponentDao.class).insert(session, project);
- userSessionRule.logon("admin").addProjectPermissions(UserRole.USER, project.key()).setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
+ userSessionRule.login("admin").addProjectPermissions(UserRole.USER, project.key()).setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
session.commit();
// project can be seen by group "anyone"
tester.get(InternalPermissionService.class).addPermission(new PermissionChange().setComponentKey(project.getKey()).setGroup(DefaultGroups.ANYONE).setPermission(UserRole.USER));
- userSessionRule.logon();
+ userSessionRule.login();
return project;
}
diff --git a/server/sonar-server/src/test/java/org/sonar/server/issue/filter/AppActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/issue/filter/AppActionTest.java
index ee80ba9d5a7..31821775dca 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/issue/filter/AppActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/issue/filter/AppActionTest.java
@@ -62,14 +62,14 @@ public class AppActionTest {
@Test
public void logged_in_app() throws Exception {
- userSessionRule.logon("eric").setUserId(123);
+ userSessionRule.login("eric").setUserId(123);
tester.newGetRequest("api/issue_filters", "app").execute()
.assertJson(getClass(), "logged_in_page.json");
}
@Test
public void logged_in_app_with_favorites() throws Exception {
- userSessionRule.logon("eric").setUserId(123);
+ userSessionRule.login("eric").setUserId(123);
when(service.findFavoriteFilters(userSessionRule)).thenReturn(Arrays.asList(
new IssueFilterDto().setId(6L).setName("My issues"),
new IssueFilterDto().setId(13L).setName("Blocker issues")
@@ -80,7 +80,7 @@ public class AppActionTest {
@Test
public void logged_in_app_with_selected_filter() throws Exception {
- userSessionRule.logon("eric").setUserId(123);
+ userSessionRule.login("eric").setUserId(123);
when(service.find(13L, userSessionRule)).thenReturn(
new IssueFilterDto().setId(13L).setName("Blocker issues").setData("severity=BLOCKER").setUserLogin("eric")
);
@@ -92,7 +92,7 @@ public class AppActionTest {
@Test
public void app_selected_filter_can_not_be_modified() throws Exception {
// logged-in user is 'eric' but filter is owned by 'simon'
- userSessionRule.logon("eric").setUserId(123).setGlobalPermissions("none");
+ userSessionRule.login("eric").setUserId(123).setGlobalPermissions("none");
when(service.find(13L, userSessionRule)).thenReturn(
new IssueFilterDto().setId(13L).setName("Blocker issues").setData("severity=BLOCKER").setUserLogin("simon").setShared(true)
);
diff --git a/server/sonar-server/src/test/java/org/sonar/server/issue/filter/FavoritesActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/issue/filter/FavoritesActionTest.java
index f65c6cc731c..bc03da1f778 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/issue/filter/FavoritesActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/issue/filter/FavoritesActionTest.java
@@ -57,7 +57,7 @@ public class FavoritesActionTest {
@Test
public void favorites_of_anonymous() throws Exception {
- userSessionRule.logon();
+ userSessionRule.login();
tester.newGetRequest("api/issue_filters", "favorites").execute()
.assertJson("{\"favoriteFilters\": []}");
@@ -65,7 +65,7 @@ public class FavoritesActionTest {
@Test
public void favorites_of_logged_in_user() throws Exception {
- userSessionRule.logon("eric").setUserId(123);
+ userSessionRule.login("eric").setUserId(123);
when(service.findFavoriteFilters(userSessionRule)).thenReturn(Arrays.asList(
new IssueFilterDto().setId(13L).setName("Blocker issues").setData("severity=BLOCKER").setUserLogin("simon").setShared(true)
));
diff --git a/server/sonar-server/src/test/java/org/sonar/server/issue/filter/ShowActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/issue/filter/ShowActionTest.java
index bf7eff3a078..392736f87fe 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/issue/filter/ShowActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/issue/filter/ShowActionTest.java
@@ -59,7 +59,7 @@ public class ShowActionTest {
@Test
public void show_filter() throws Exception {
// logged-in user is 'eric' but filter is owned by 'simon'
- userSessionRule.logon("eric").setUserId(123).setGlobalPermissions("none");
+ userSessionRule.login("eric").setUserId(123).setGlobalPermissions("none");
when(service.find(13L, userSessionRule)).thenReturn(
new IssueFilterDto().setId(13L).setName("Blocker issues").setDescription("All Blocker Issues").setData("severity=BLOCKER").setUserLogin("simon").setShared(true)
);
@@ -70,7 +70,7 @@ public class ShowActionTest {
@Test
public void show_unknown_filter() throws Exception {
- userSessionRule.logon("eric").setUserId(123).setGlobalPermissions("none");
+ userSessionRule.login("eric").setUserId(123).setGlobalPermissions("none");
when(service.find(42L, userSessionRule)).thenThrow(new NotFoundException("Filter 42 does not exist"));
try {
diff --git a/server/sonar-server/src/test/java/org/sonar/server/issue/index/IssueIndexTest.java b/server/sonar-server/src/test/java/org/sonar/server/issue/index/IssueIndexTest.java
index 01ef670374a..9bb25207e18 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/issue/index/IssueIndexTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/issue/index/IssueIndexTest.java
@@ -1122,19 +1122,19 @@ public class IssueIndexTest {
// project3 can be seen by nobody
indexIssue(IssueTesting.newDoc("ISSUE3", file3), null, null);
- userSessionRule.logon().setUserGroups("sonar-users");
+ userSessionRule.login().setUserGroups("sonar-users");
assertThat(index.search(IssueQuery.builder(userSessionRule).build(), new SearchOptions()).getDocs()).hasSize(1);
- userSessionRule.logon().setUserGroups("sonar-admins");
+ userSessionRule.login().setUserGroups("sonar-admins");
assertThat(index.search(IssueQuery.builder(userSessionRule).build(), new SearchOptions()).getDocs()).hasSize(1);
- userSessionRule.logon().setUserGroups("sonar-users", "sonar-admins");
+ userSessionRule.login().setUserGroups("sonar-users", "sonar-admins");
assertThat(index.search(IssueQuery.builder(userSessionRule).build(), new SearchOptions()).getDocs()).hasSize(2);
- userSessionRule.logon().setUserGroups("another group");
+ userSessionRule.login().setUserGroups("another group");
assertThat(index.search(IssueQuery.builder(userSessionRule).build(), new SearchOptions()).getDocs()).isEmpty();
- userSessionRule.logon().setUserGroups("sonar-users", "sonar-admins");
+ userSessionRule.login().setUserGroups("sonar-users", "sonar-admins");
assertThat(index.search(IssueQuery.builder(userSessionRule).projectUuids(newArrayList(project3.uuid())).build(), new SearchOptions()).getDocs()).isEmpty();
}
@@ -1153,17 +1153,17 @@ public class IssueIndexTest {
indexIssue(IssueTesting.newDoc("ISSUE2", file2), null, "max");
indexIssue(IssueTesting.newDoc("ISSUE3", file3), null, null);
- userSessionRule.logon("john");
+ userSessionRule.login("john");
assertThat(index.search(IssueQuery.builder(userSessionRule).build(), new SearchOptions()).getDocs()).hasSize(1);
- userSessionRule.logon("max");
+ userSessionRule.login("max");
assertThat(index.search(IssueQuery.builder(userSessionRule).build(), new SearchOptions()).getDocs()).hasSize(1);
- userSessionRule.logon("another guy");
+ userSessionRule.login("another guy");
assertThat(index.search(IssueQuery.builder(userSessionRule).build(), new SearchOptions()).getDocs()).hasSize(0);
- userSessionRule.logon("john");
+ userSessionRule.login("john");
assertThat(index.search(IssueQuery.builder(userSessionRule).projectUuids(newArrayList(project3.key())).build(), new SearchOptions()).getDocs()).hasSize(0);
}
@@ -1179,7 +1179,7 @@ public class IssueIndexTest {
indexIssue(IssueTesting.newDoc("ISSUE1", file1), "sonar-users", "john");
indexIssue(IssueTesting.newDoc("ISSUE2", file2), null, "max");
- userSessionRule.logon("john").setUserGroups("sonar-users");
+ userSessionRule.login("john").setUserGroups("sonar-users");
assertThat(index.search(IssueQuery.builder(userSessionRule).build(), new SearchOptions()).getDocs()).hasSize(1);
}
diff --git a/server/sonar-server/src/test/java/org/sonar/server/issue/ws/IssueActionsWriterTest.java b/server/sonar-server/src/test/java/org/sonar/server/issue/ws/IssueActionsWriterTest.java
index 28ba950a7f9..34aab044a41 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/issue/ws/IssueActionsWriterTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/issue/ws/IssueActionsWriterTest.java
@@ -72,7 +72,7 @@ public class IssueActionsWriterTest {
.setProjectKey("sample")
.setRuleKey(RuleKey.of("squid", "AvoidCycle"));
- userSessionRule.logon("john").addProjectUuidPermissions(UserRole.ISSUE_ADMIN, "ABCD");
+ userSessionRule.login("john").addProjectUuidPermissions(UserRole.ISSUE_ADMIN, "ABCD");
testActions(issue,
"{\"actions\": " +
@@ -89,7 +89,7 @@ public class IssueActionsWriterTest {
.setProjectKey("sample")
.setRuleKey(RuleKey.of("squid", "AvoidCycle"));
- userSessionRule.logon("john");
+ userSessionRule.login("john");
Action action = mock(Action.class);
when(action.key()).thenReturn("link-to-jira");
when(actionService.listAvailableActions(eq(issue))).thenReturn(newArrayList(action));
@@ -110,7 +110,7 @@ public class IssueActionsWriterTest {
.setRuleKey(RuleKey.of("squid", "AvoidCycle"))
.setResolution("CLOSED");
- userSessionRule.logon("john");
+ userSessionRule.login("john");
testActions(issue,
"{\"actions\": " +
@@ -140,7 +140,7 @@ public class IssueActionsWriterTest {
.setRuleKey(RuleKey.of("squid", "AvoidCycle"))
.setAssignee("john");
- userSessionRule.logon("john");
+ userSessionRule.login("john");
testActions(issue,
"{\"actions\": " +
@@ -158,7 +158,7 @@ public class IssueActionsWriterTest {
.setRuleKey(RuleKey.of("squid", "AvoidCycle"));
when(issueService.listTransitions(eq(issue))).thenReturn(newArrayList(Transition.create("reopen", "RESOLVED", "REOPEN")));
- userSessionRule.logon("john");
+ userSessionRule.login("john");
testTransitions(issue,
"{\"transitions\": [\n" +
@@ -174,7 +174,7 @@ public class IssueActionsWriterTest {
.setProjectKey("sample")
.setRuleKey(RuleKey.of("squid", "AvoidCycle"));
- userSessionRule.logon("john");
+ userSessionRule.login("john");
testTransitions(issue,
"{\"transitions\": []}");
diff --git a/server/sonar-server/src/test/java/org/sonar/server/issue/ws/IssueShowActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/issue/ws/IssueShowActionTest.java
index 07923c3b454..b9e6343413a 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/issue/ws/IssueShowActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/issue/ws/IssueShowActionTest.java
@@ -436,7 +436,7 @@ public class IssueShowActionTest {
when(i18n.ageFromNow(any(Locale.class), eq(date1))).thenReturn("9 days");
when(i18n.ageFromNow(any(Locale.class), eq(date2))).thenReturn("10 days");
- userSessionRule.logon("arthur");
+ userSessionRule.login("arthur");
WsTester.TestRequest request = tester.newGetRequest("api/issues", "show").setParam("key", issue.key());
request.execute().assertJson(getClass(), "show_issue_with_comments.json");
}
@@ -450,7 +450,7 @@ public class IssueShowActionTest {
when(issueService.listTransitions(eq(issue))).thenReturn(newArrayList(Transition.create("reopen", "RESOLVED", "REOPEN")));
- userSessionRule.logon("john");
+ userSessionRule.login("john");
WsTester.TestRequest request = tester.newGetRequest("api/issues", "show").setParam("key", issue.key());
request.execute().assertJson(getClass(), "show_issue_with_transitions.json");
}
@@ -461,7 +461,7 @@ public class IssueShowActionTest {
.setStatus("OPEN");
when(issueService.getByKey(issue.key())).thenReturn(issue);
- userSessionRule.logon("john");
+ userSessionRule.login("john");
WsTester.TestRequest request = tester.newGetRequest("api/issues", "show").setParam("key", issue.key());
request.execute().assertJson(getClass(), "show_issue_with_actions.json");
}
diff --git a/server/sonar-server/src/test/java/org/sonar/server/issue/ws/SearchActionComponentsMediumTest.java b/server/sonar-server/src/test/java/org/sonar/server/issue/ws/SearchActionComponentsMediumTest.java
index fd1144b1495..0a5e71aa09f 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/issue/ws/SearchActionComponentsMediumTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/issue/ws/SearchActionComponentsMediumTest.java
@@ -363,7 +363,7 @@ public class SearchActionComponentsMediumTest {
session.commit();
tester.get(IssueIndexer.class).indexAll();
- userSessionRule.logon("john");
+ userSessionRule.login("john");
WsTester.Result result = wsTester.newGetRequest(IssuesWs.API_ENDPOINT, SearchAction.SEARCH_ACTION)
.setParam("resolved", "false")
.setParam(WebService.Param.FACETS, "directories")
@@ -382,7 +382,7 @@ public class SearchActionComponentsMediumTest {
indexView(view.uuid(), newArrayList(project.uuid()));
setAnyoneProjectPermission(view, UserRole.USER);
- userSessionRule.logon("john").addProjectUuidPermissions(UserRole.USER, view.uuid());
+ userSessionRule.login("john").addProjectUuidPermissions(UserRole.USER, view.uuid());
wsTester.newGetRequest(IssuesWs.API_ENDPOINT, SearchAction.SEARCH_ACTION)
.setParam(IssueFilterParameters.COMPONENT_UUIDS, view.uuid())
@@ -402,7 +402,7 @@ public class SearchActionComponentsMediumTest {
setAnyoneProjectPermission(view, UserRole.USER);
// User has wrong permission on the view, no issue will be returned
- userSessionRule.logon("john").addProjectUuidPermissions(UserRole.CODEVIEWER, view.uuid());
+ userSessionRule.login("john").addProjectUuidPermissions(UserRole.CODEVIEWER, view.uuid());
wsTester.newGetRequest(IssuesWs.API_ENDPOINT, SearchAction.SEARCH_ACTION)
.setParam(IssueFilterParameters.COMPONENT_UUIDS, view.uuid())
@@ -423,7 +423,7 @@ public class SearchActionComponentsMediumTest {
indexView(subView.uuid(), newArrayList(project.uuid()));
setAnyoneProjectPermission(view, UserRole.USER);
- userSessionRule.logon("john").addComponentUuidPermission(UserRole.USER, view.uuid(), subView.uuid());
+ userSessionRule.login("john").addComponentUuidPermission(UserRole.USER, view.uuid(), subView.uuid());
wsTester.newGetRequest(IssuesWs.API_ENDPOINT, SearchAction.SEARCH_ACTION)
.setParam(IssueFilterParameters.COMPONENT_UUIDS, subView.uuid())
@@ -445,7 +445,7 @@ public class SearchActionComponentsMediumTest {
setAnyoneProjectPermission(view, UserRole.USER);
// User has wrong permission on the view, no issue will be returned
- userSessionRule.logon("john").addComponentUuidPermission(UserRole.CODEVIEWER, view.uuid(), subView.uuid());
+ userSessionRule.login("john").addComponentUuidPermission(UserRole.CODEVIEWER, view.uuid(), subView.uuid());
wsTester.newGetRequest(IssuesWs.API_ENDPOINT, SearchAction.SEARCH_ACTION)
.setParam(IssueFilterParameters.COMPONENT_UUIDS, subView.uuid())
@@ -549,7 +549,7 @@ public class SearchActionComponentsMediumTest {
}
private void setAnyoneProjectPermission(ComponentDto project, String permission) {
- userSessionRule.logon("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
+ userSessionRule.login("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
tester.get(InternalPermissionService.class).addPermission(new PermissionChange().setComponentKey(project.getKey()).setGroup(DefaultGroups.ANYONE).setPermission(permission));
}
diff --git a/server/sonar-server/src/test/java/org/sonar/server/issue/ws/SearchActionMediumTest.java b/server/sonar-server/src/test/java/org/sonar/server/issue/ws/SearchActionMediumTest.java
index 46858518bae..714cc6b1b12 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/issue/ws/SearchActionMediumTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/issue/ws/SearchActionMediumTest.java
@@ -163,7 +163,7 @@ public class SearchActionMediumTest {
session.commit();
tester.get(IssueIndexer.class).indexAll();
- userSessionRule.logon("john");
+ userSessionRule.login("john");
WsTester.Result result = wsTester.newGetRequest(IssuesWs.API_ENDPOINT, SearchAction.SEARCH_ACTION).execute();
result.assertJson(this.getClass(), "issue_with_comment.json");
}
@@ -197,7 +197,7 @@ public class SearchActionMediumTest {
session.commit();
tester.get(IssueIndexer.class).indexAll();
- userSessionRule.logon("john");
+ userSessionRule.login("john");
WsTester.Result result = wsTester.newGetRequest(IssuesWs.API_ENDPOINT, SearchAction.SEARCH_ACTION).setParam(IssueFilterParameters.HIDE_COMMENTS, "true").execute();
result.assertJson(this.getClass(), "issue_with_comment_hidden.json");
assertThat(result.outputAsString()).doesNotContain("fabrice");
@@ -271,7 +271,7 @@ public class SearchActionMediumTest {
session.commit();
tester.get(IssueIndexer.class).indexAll();
- userSessionRule.logon("john");
+ userSessionRule.login("john");
WsTester.Result result = wsTester.newGetRequest(IssuesWs.API_ENDPOINT, SearchAction.SEARCH_ACTION)
.setParam("extra_fields", "actions,transitions,assigneeName,reporterName,actionPlanName").execute();
result.assertJson(this.getClass(), "issue_with_extra_fields.json");
@@ -405,7 +405,7 @@ public class SearchActionMediumTest {
session.commit();
tester.get(IssueIndexer.class).indexAll();
- userSessionRule.logon("john");
+ userSessionRule.login("john");
WsTester.Result result = wsTester.newGetRequest(IssuesWs.API_ENDPOINT, SearchAction.SEARCH_ACTION)
.setParam("resolved", "false")
.setParam(WebService.Param.FACETS, "statuses,severities,resolutions,projectUuids,rules,fileUuids,assignees,languages,actionPlans")
@@ -429,7 +429,7 @@ public class SearchActionMediumTest {
session.commit();
tester.get(IssueIndexer.class).indexAll();
- userSessionRule.logon("john");
+ userSessionRule.login("john");
WsTester.Result result = wsTester.newGetRequest(IssuesWs.API_ENDPOINT, SearchAction.SEARCH_ACTION)
.setParam("resolved", "false")
.setParam("severities", "MAJOR,MINOR")
@@ -472,7 +472,7 @@ public class SearchActionMediumTest {
session.commit();
tester.get(IssueIndexer.class).indexAll();
- userSessionRule.logon("john");
+ userSessionRule.login("john");
wsTester.newGetRequest(IssuesWs.API_ENDPOINT, SearchAction.SEARCH_ACTION)
.setParam("resolved", "false")
.setParam("assignees", "__me__")
@@ -483,7 +483,7 @@ public class SearchActionMediumTest {
@Test
public void filter_by_assigned_to_me_unauthenticated() throws Exception {
- userSessionRule.logon();
+ userSessionRule.login();
ComponentDto project = insertComponent(ComponentTesting.newProjectDto("ABCD").setKey("MyProject"));
setDefaultProjectPermission(project);
@@ -544,7 +544,7 @@ public class SearchActionMediumTest {
session.commit();
tester.get(IssueIndexer.class).indexAll();
- userSessionRule.logon("john-bob.polop");
+ userSessionRule.login("john-bob.polop");
wsTester.newGetRequest(IssuesWs.API_ENDPOINT, SearchAction.SEARCH_ACTION)
.setParam("resolved", "false")
.setParam("assignees", "alice")
@@ -681,9 +681,9 @@ public class SearchActionMediumTest {
private void setDefaultProjectPermission(ComponentDto project) {
// project can be seen by anyone and by code viewer
- userSessionRule.logon("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
+ userSessionRule.login("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
tester.get(InternalPermissionService.class).addPermission(new PermissionChange().setComponentKey(project.getKey()).setGroup(DefaultGroups.ANYONE).setPermission(UserRole.USER));
- userSessionRule.logon();
+ userSessionRule.login();
}
private ComponentDto insertComponent(ComponentDto component) {
diff --git a/server/sonar-server/src/test/java/org/sonar/server/permission/InternalPermissionServiceMediumTest.java b/server/sonar-server/src/test/java/org/sonar/server/permission/InternalPermissionServiceMediumTest.java
index 57190440976..6023df7133e 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/permission/InternalPermissionServiceMediumTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/permission/InternalPermissionServiceMediumTest.java
@@ -82,7 +82,7 @@ public class InternalPermissionServiceMediumTest {
@Test
public void add_project_permission_to_user() {
// init
- userSessionRule.logon("admin").addProjectPermissions(UserRole.ADMIN, project.key());
+ userSessionRule.login("admin").addProjectPermissions(UserRole.ADMIN, project.key());
UserDto user = new UserDto().setLogin("john").setName("John");
db.userDao().insert(session, user);
session.commit();
@@ -102,7 +102,7 @@ public class InternalPermissionServiceMediumTest {
@Test
public void remove_project_permission_to_user() {
- userSessionRule.logon("admin").addProjectPermissions(UserRole.ADMIN, project.key());
+ userSessionRule.login("admin").addProjectPermissions(UserRole.ADMIN, project.key());
UserDto user1 = new UserDto().setLogin("user1").setName("User1");
db.userDao().insert(session, user1);
@@ -126,7 +126,7 @@ public class InternalPermissionServiceMediumTest {
@Test
public void remove_all_component_user_permissions() {
- userSessionRule.logon("admin").addProjectPermissions(UserRole.ADMIN, project.key());
+ userSessionRule.login("admin").addProjectPermissions(UserRole.ADMIN, project.key());
UserDto user = new UserDto().setLogin("user1").setName("User1");
db.userDao().insert(session, user);
@@ -154,7 +154,7 @@ public class InternalPermissionServiceMediumTest {
@Test
public void add_and_remove_permission_to_group() {
// init
- userSessionRule.logon("admin").addProjectPermissions(UserRole.ADMIN, project.key());
+ userSessionRule.login("admin").addProjectPermissions(UserRole.ADMIN, project.key());
GroupDto group = new GroupDto().setName("group1");
db.groupDao().insert(session, group);
session.commit();
diff --git a/server/sonar-server/src/test/java/org/sonar/server/permission/InternalPermissionTemplateServiceTest.java b/server/sonar-server/src/test/java/org/sonar/server/permission/InternalPermissionTemplateServiceTest.java
index 530450cdcc2..815c63980b9 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/permission/InternalPermissionTemplateServiceTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/permission/InternalPermissionTemplateServiceTest.java
@@ -90,7 +90,7 @@ public class InternalPermissionTemplateServiceTest {
@Before
public void setUp() {
- userSessionRule.logon("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
+ userSessionRule.login("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
MyBatis myBatis = mock(MyBatis.class);
when(myBatis.openSession(false)).thenReturn(session);
@@ -216,7 +216,7 @@ public class InternalPermissionTemplateServiceTest {
@Test
public void should_retrieve_all_permission_templates_from_project() {
- userSessionRule.logon("admin").addProjectPermissions(UserRole.ADMIN, "org.sample.Sample");
+ userSessionRule.login("admin").addProjectPermissions(UserRole.ADMIN, "org.sample.Sample");
PermissionTemplateDto template1 =
new PermissionTemplateDto().setId(1L).setName("template1").setDescription("template1");
diff --git a/server/sonar-server/src/test/java/org/sonar/server/permission/PermissionTemplateUpdaterTest.java b/server/sonar-server/src/test/java/org/sonar/server/permission/PermissionTemplateUpdaterTest.java
index 4d62088342f..d18eb7b79d2 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/permission/PermissionTemplateUpdaterTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/permission/PermissionTemplateUpdaterTest.java
@@ -56,7 +56,7 @@ public class PermissionTemplateUpdaterTest {
@Before
public void setUpCommonMocks() {
- userSessionRule.logon("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
+ userSessionRule.login("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
userDao = mock(UserDao.class);
stub(userDao.selectActiveUserByLogin("user")).toReturn(DEFAULT_USER);
stub(userDao.selectGroupByName("group")).toReturn(DEFAULT_GROUP);
@@ -134,7 +134,7 @@ public class PermissionTemplateUpdaterTest {
expected.expect(ForbiddenException.class);
expected.expectMessage("Insufficient privileges");
- userSessionRule.logon("user").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
+ userSessionRule.login("user").setGlobalPermissions(GlobalPermissions.SCAN_EXECUTION);
PermissionTemplateUpdater updater = new PermissionTemplateUpdater(null, null, null, null, null, userSessionRule) {
@Override
diff --git a/server/sonar-server/src/test/java/org/sonar/server/platform/ws/SystemInfoWsActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/platform/ws/SystemInfoWsActionTest.java
index 86517b09fdf..f93b1fd2992 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/platform/ws/SystemInfoWsActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/platform/ws/SystemInfoWsActionTest.java
@@ -38,7 +38,7 @@ import static org.mockito.Mockito.when;
public class SystemInfoWsActionTest {
@Rule
- public UserSessionRule userSessionRule = UserSessionRule.standalone().logon("login")
+ public UserSessionRule userSessionRule = UserSessionRule.standalone().login("login")
.setName("name");
Monitor monitor1 = mock(Monitor.class);
diff --git a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/QProfileProjectOperationsMediumTest.java b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/QProfileProjectOperationsMediumTest.java
index 22f97568b4f..28f09a659cb 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/QProfileProjectOperationsMediumTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/QProfileProjectOperationsMediumTest.java
@@ -146,7 +146,7 @@ public class QProfileProjectOperationsMediumTest {
db.userDao().insert(dbSession, user);
tester.get(PermissionFacade.class).insertUserPermission(project1.getId(), user.getId(), UserRole.USER, dbSession);
tester.get(PermissionFacade.class).insertUserPermission(project2.getId(), user.getId(), UserRole.USER, dbSession);
- UserSession userSession = userSessionRule.logon("john").setUserId(user.getId().intValue()).setName("John")
+ UserSession userSession = userSessionRule.login("john").setUserId(user.getId().intValue()).setName("John")
.setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
dbSession.commit();
diff --git a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/QProfileServiceMediumTest.java b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/QProfileServiceMediumTest.java
index 8578e79503f..e635ee2d7ba 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/QProfileServiceMediumTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/QProfileServiceMediumTest.java
@@ -100,7 +100,7 @@ public class QProfileServiceMediumTest {
@Test
public void create_profile() {
- userSessionRule.logon().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
QualityProfileDto profile = service.create(QProfileName.createFor("xoo", "New Profile"), null).profile();
@@ -111,7 +111,7 @@ public class QProfileServiceMediumTest {
@Test
public void create_profile_with_xml() {
- userSessionRule.logon().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
db.ruleDao().insert(dbSession, RuleTesting.newDto(RuleKey.of("xoo", "R1")).setLanguage("xoo").setSeverity("MINOR"));
dbSession.commit();
@@ -129,7 +129,7 @@ public class QProfileServiceMediumTest {
@Test
public void count_by_all_profiles() {
- userSessionRule.logon().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
service.activate(XOO_P1_KEY, new RuleActivation(RuleTesting.XOO_X1).setSeverity("BLOCKER"));
service.activate(XOO_P2_KEY, new RuleActivation(RuleTesting.XOO_X1).setSeverity("BLOCKER"));
@@ -144,7 +144,7 @@ public class QProfileServiceMediumTest {
@Test
public void stat_for_all_profiles() {
- userSessionRule.logon().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
service.activate(XOO_P1_KEY, new RuleActivation(RuleTesting.XOO_X1).setSeverity("MINOR"));
service.activate(XOO_P2_KEY, new RuleActivation(RuleTesting.XOO_X1).setSeverity("BLOCKER"));
@@ -161,7 +161,7 @@ public class QProfileServiceMediumTest {
@Test
public void count_by_deprecated() {
- userSessionRule.logon().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
// create deprecated rule
RuleDto deprecatedXooRule = RuleTesting.newDto(RuleKey.of("xoo", "deprecated1"))
@@ -179,7 +179,7 @@ public class QProfileServiceMediumTest {
@Test
public void search_qprofile_activity() {
- userSessionRule.logon("david").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("david").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
UserDto user = new UserDto().setLogin("david").setName("David").setEmail("dav@id.com").setCreatedAt(System.currentTimeMillis()).setUpdatedAt(System.currentTimeMillis());
db.userDao().insert(dbSession, user);
@@ -212,7 +212,7 @@ public class QProfileServiceMediumTest {
@Test
public void search_qprofile_activity_without_severity() {
- userSessionRule.logon().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
RuleKey ruleKey = RuleKey.of("xoo", "deleted_rule");
@@ -231,7 +231,7 @@ public class QProfileServiceMediumTest {
@Test
public void search_qprofile_activity_with_user_not_found() {
- userSessionRule.logon("david").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("david").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
// We need an actual rule in DB to test RuleName in Activity
db.ruleDao().getByKey(dbSession, RuleTesting.XOO_X1);
@@ -254,7 +254,7 @@ public class QProfileServiceMediumTest {
@Test
public void search_qprofile_activity_with_rule_not_found() {
- userSessionRule.logon().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
RuleKey ruleKey = RuleKey.of("xoo", "deleted_rule");
@@ -310,7 +310,7 @@ public class QProfileServiceMediumTest {
@Test
public void set_default() {
- userSessionRule.logon().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
assertThat(service.getDefault("xoo")).isNull();
diff --git a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileChangeParentActionMediumTest.java b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileChangeParentActionMediumTest.java
index f5ceee8a516..14beeb84bc1 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileChangeParentActionMediumTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileChangeParentActionMediumTest.java
@@ -64,7 +64,7 @@ public class QProfileChangeParentActionMediumTest {
ws = tester.get(QProfilesWs.class);
wsTester = tester.get(WsTester.class);
session = db.openSession(false);
- userSessionRule.logon("gandalf").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("gandalf").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
}
@After
@@ -259,7 +259,7 @@ public class QProfileChangeParentActionMediumTest {
@Test(expected = ForbiddenException.class)
public void fail_if_missing_permission() throws Exception {
- userSessionRule.logon("anakin");
+ userSessionRule.login("anakin");
wsTester.newGetRequest(QProfilesWs.API_ENDPOINT, "change_parent")
.setParam(QProfileIdentificationParamUtils.PARAM_PROFILE_KEY, "polop")
.setParam("parentKey", "pulup")
diff --git a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileCopyActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileCopyActionTest.java
index 3681fdc3b83..bf14f0935bb 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileCopyActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileCopyActionTest.java
@@ -60,7 +60,7 @@ public class QProfileCopyActionTest {
@Test
public void copy_nominal() throws Exception {
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
String fromProfileKey = "xoo-sonar-way-23456";
String toName = "Other Sonar Way";
@@ -80,7 +80,7 @@ public class QProfileCopyActionTest {
@Test
public void copy_with_parent() throws Exception {
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
String fromProfileKey = "xoo-sonar-way-23456";
String toName = "Other Sonar Way";
@@ -101,7 +101,7 @@ public class QProfileCopyActionTest {
@Test(expected = IllegalArgumentException.class)
public void fail_on_missing_key() throws Exception {
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
tester.newPostRequest("api/qualityprofiles", "copy")
.setParam("name", "Other Sonar Way")
@@ -110,7 +110,7 @@ public class QProfileCopyActionTest {
@Test(expected = IllegalArgumentException.class)
public void fail_on_missing_name() throws Exception {
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
tester.newPostRequest("api/qualityprofiles", "copy")
.setParam("key", "sonar-way-xoo1-13245")
@@ -119,7 +119,7 @@ public class QProfileCopyActionTest {
@Test(expected = ForbiddenException.class)
public void fail_on_missing_permission() throws Exception {
- userSessionRule.logon("obiwan");
+ userSessionRule.login("obiwan");
tester.newPostRequest("api/qualityprofiles", "copy")
.setParam("key", "sonar-way-xoo1-13245")
diff --git a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileCreateActionMediumTest.java b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileCreateActionMediumTest.java
index 431a070b3c4..d0c187dd61f 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileCreateActionMediumTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileCreateActionMediumTest.java
@@ -74,7 +74,7 @@ public class QProfileCreateActionMediumTest {
@Test
public void create_nominal() throws Exception {
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
wsTester.newPostRequest("api/qualityprofiles", "create")
.setParam("backup_XooProfileImporter", "a value for xoo importer")
@@ -85,7 +85,7 @@ public class QProfileCreateActionMediumTest {
@Test
public void create_with_messages() throws Exception {
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
wsTester.newPostRequest("api/qualityprofiles", "create")
.setParam("backup_XooProfileImporter", "a value for xoo importer")
@@ -97,7 +97,7 @@ public class QProfileCreateActionMediumTest {
@Test(expected = BadRequestException.class)
public void fail_on_error_from_importer() throws Exception {
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
wsTester.newPostRequest("api/qualityprofiles", "create")
.setParam("backup_XooProfileImporter", "a value for xoo importer")
diff --git a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileCreateActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileCreateActionTest.java
index 1f785995342..d3085347f13 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileCreateActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileCreateActionTest.java
@@ -56,7 +56,7 @@ public class QProfileCreateActionTest {
Action create = wsTester.controller("api/qualityprofiles").action("create");
assertThat(create.params()).hasSize(2);
- userSessionRule.logon("anakin").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("anakin").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
wsTester.newPostRequest("api/qualityprofiles", "create")
.setParam("language", xooKey).setParam("name", "Yeehaw!").execute().assertJson(getClass(), "create-no-importer.json");
diff --git a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileDeleteActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileDeleteActionTest.java
index 7ba826b07ab..ec94fb14445 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileDeleteActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileDeleteActionTest.java
@@ -101,7 +101,7 @@ public class QProfileDeleteActionTest {
qualityProfileDao.insertProjectProfileAssociation(project.uuid(), profileKey, session);
session.commit();
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
tester.newPostRequest("api/qualityprofiles", "delete").setParam("profileKey", "sonar-way-xoo1-12345").execute().assertNoContent();
@@ -119,7 +119,7 @@ public class QProfileDeleteActionTest {
qualityProfileDao.insertProjectProfileAssociation(project.uuid(), profileKey, session);
session.commit();
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
tester.newPostRequest("api/qualityprofiles", "delete").setParam("profileName", "Sonar way").setParam("language", xoo1.getKey()).execute().assertNoContent();
@@ -129,37 +129,37 @@ public class QProfileDeleteActionTest {
@Test(expected = ForbiddenException.class)
public void fail_on_missing_permission() throws Exception {
- userSessionRule.logon("obiwan");
+ userSessionRule.login("obiwan");
tester.newPostRequest("api/qualityprofiles", "delete").execute();
}
@Test(expected = IllegalArgumentException.class)
public void fail_on_missing_arguments() throws Exception {
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
tester.newPostRequest("api/qualityprofiles", "delete").execute();
}
@Test(expected = IllegalArgumentException.class)
public void fail_on_missing_language() throws Exception {
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
tester.newPostRequest("api/qualityprofiles", "delete").setParam("profileName", "Polop").execute();
}
@Test(expected = IllegalArgumentException.class)
public void fail_on_missing_name() throws Exception {
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
tester.newPostRequest("api/qualityprofiles", "delete").setParam("language", xoo1.getKey()).execute();
}
@Test(expected = IllegalArgumentException.class)
public void fail_on_too_many_arguments() throws Exception {
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
tester.newPostRequest("api/qualityprofiles", "delete").setParam("profileName", "Polop").setParam("language", xoo1.getKey()).setParam("profileKey", "polop").execute();
}
@Test(expected = NotFoundException.class)
public void fail_on_unexisting_profile() throws Exception {
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
tester.newPostRequest("api/qualityprofiles", "delete").setParam("profileName", "Polop").setParam("language", xoo1.getKey()).execute();
}
}
diff --git a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileProjectsActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileProjectsActionTest.java
index 29cb83fcfe2..23fec4a8451 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileProjectsActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileProjectsActionTest.java
@@ -84,7 +84,7 @@ public class QProfileProjectsActionTest {
mock(ProjectAssociationActions.class),
new QProfileProjectsAction(dbClient, userSessionRule)));
- userSessionRule.logon("obiwan").setUserId(userId.intValue());
+ userSessionRule.login("obiwan").setUserId(userId.intValue());
new UserDao(dbTester.myBatis(), mock(System2.class))
.insert(session, new UserDto()
.setActive(true)
diff --git a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileRenameActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileRenameActionTest.java
index 0374142ccef..fc6a0536b22 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileRenameActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileRenameActionTest.java
@@ -81,7 +81,7 @@ public class QProfileRenameActionTest {
@Test
public void rename_nominal() throws Exception {
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
tester.newPostRequest("api/qualityprofiles", "rename")
.setParam("key", "sonar-way-xoo2-23456")
@@ -93,7 +93,7 @@ public class QProfileRenameActionTest {
@Test(expected = BadRequestException.class)
public void do_nothing_on_conflict() throws Exception {
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
tester.newPostRequest("api/qualityprofiles", "rename")
.setParam("key", "sonar-way-xoo2-23456")
@@ -103,7 +103,7 @@ public class QProfileRenameActionTest {
@Test(expected = IllegalArgumentException.class)
public void fail_on_missing_key() throws Exception {
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
tester.newPostRequest("api/qualityprofiles", "rename")
.setParam("name", "Other Sonar Way")
@@ -112,7 +112,7 @@ public class QProfileRenameActionTest {
@Test(expected = IllegalArgumentException.class)
public void fail_on_missing_name() throws Exception {
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
tester.newPostRequest("api/qualityprofiles", "rename")
.setParam("key", "sonar-way-xoo1-13245")
@@ -121,7 +121,7 @@ public class QProfileRenameActionTest {
@Test(expected = ForbiddenException.class)
public void fail_on_missing_permission() throws Exception {
- userSessionRule.logon("obiwan");
+ userSessionRule.login("obiwan");
tester.newPostRequest("api/qualityprofiles", "rename")
.setParam("key", "sonar-way-xoo1-13245")
@@ -131,7 +131,7 @@ public class QProfileRenameActionTest {
@Test(expected = IllegalArgumentException.class)
public void fail_on_unknown_profile() throws Exception {
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
tester.newPostRequest("api/qualityprofiles", "rename")
.setParam("key", "polop")
diff --git a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileRestoreActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileRestoreActionTest.java
index 70bb0eaf12a..4d538499782 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileRestoreActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileRestoreActionTest.java
@@ -64,7 +64,7 @@ public class QProfileRestoreActionTest {
@Test
public void restore_profile() throws Exception {
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
QualityProfileDto profile = QualityProfileDto.createFor("xoo-sonar-way-12345")
.setDefault(false).setLanguage("xoo").setName("Sonar way");
@@ -78,14 +78,14 @@ public class QProfileRestoreActionTest {
@Test(expected = IllegalArgumentException.class)
public void fail_on_missing_backup() throws Exception {
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
tester.newGetRequest("api/qualityprofiles", "restore").execute();
}
@Test(expected = ForbiddenException.class)
public void fail_on_misssing_permission() throws Exception {
- userSessionRule.logon("obiwan");
+ userSessionRule.login("obiwan");
tester.newPostRequest("api/qualityprofiles", "restore").setParam("backup", "").execute();
}
diff --git a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileSetDefaultActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileSetDefaultActionTest.java
index a01c788be43..e621bd0d0b5 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileSetDefaultActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfileSetDefaultActionTest.java
@@ -84,7 +84,7 @@ public class QProfileSetDefaultActionTest {
@Test
public void set_default_profile_using_key() throws Exception {
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
checkDefaultProfile(xoo1Key, "sonar-way-xoo1-12345");
@@ -105,7 +105,7 @@ public class QProfileSetDefaultActionTest {
@Test
public void set_default_profile_using_language_and_name() throws Exception {
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
tester.newPostRequest("api/qualityprofiles", "set_default").setParam("language", xoo2Key).setParam("profileName", "Sonar way").execute().assertNoContent();
@@ -115,7 +115,7 @@ public class QProfileSetDefaultActionTest {
@Test
public void fail_to_set_default_profile_using_key() throws Exception {
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
try {
tester.newPostRequest("api/qualityprofiles", "set_default").setParam("profileKey", "unknown-profile-666").execute();
@@ -130,7 +130,7 @@ public class QProfileSetDefaultActionTest {
@Test
public void fail_to_set_default_profile_using_language_and_name() throws Exception {
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
try {
tester.newPostRequest("api/qualityprofiles", "set_default").setParam("language", xoo2Key).setParam("profileName", "Unknown").execute();
@@ -144,7 +144,7 @@ public class QProfileSetDefaultActionTest {
@Test
public void fail_on_missing_permission() throws Exception {
- userSessionRule.logon("obiwan");
+ userSessionRule.login("obiwan");
try {
tester.newPostRequest("api/qualityprofiles", "set_default").setParam("profileKey", "sonar-way-xoo2-23456").execute().assertNoContent();
diff --git a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfilesWsMediumTest.java b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfilesWsMediumTest.java
index fce5c1e8d37..985b0f52143 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfilesWsMediumTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/qualityprofile/ws/QProfilesWsMediumTest.java
@@ -60,7 +60,7 @@ public class QProfilesWsMediumTest {
public static ServerTester tester = new ServerTester();
@Rule
public UserSessionRule userSessionRule = UserSessionRule.forServerTester(tester)
- .logon("gandalf").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ .login("gandalf").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
QProfilesWs ws;
DbClient db;
diff --git a/server/sonar-server/src/test/java/org/sonar/server/rule/RegisterRulesMediumTest.java b/server/sonar-server/src/test/java/org/sonar/server/rule/RegisterRulesMediumTest.java
index 9b45602d1dd..c9d52563aab 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/rule/RegisterRulesMediumTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/rule/RegisterRulesMediumTest.java
@@ -357,7 +357,7 @@ public class RegisterRulesMediumTest {
});
// Create a profile and activate rule
- userSessionRule.logon().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
db.qualityProfileDao().insert(dbSession, QProfileTesting.newXooP1());
dbSession.commit();
dbSession.clearCache();
@@ -387,7 +387,7 @@ public class RegisterRulesMediumTest {
register(rules);
// create a profile and activate rule
- userSessionRule.logon().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
db.qualityProfileDao().insert(dbSession, QProfileTesting.newXooP1());
dbSession.commit();
dbSession.clearCache();
@@ -419,7 +419,7 @@ public class RegisterRulesMediumTest {
});
// Create profile and activate rule
- userSessionRule.logon().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
db.qualityProfileDao().insert(dbSession, QProfileTesting.newXooP1());
dbSession.commit();
dbSession.clearCache();
diff --git a/server/sonar-server/src/test/java/org/sonar/server/rule/RuleServiceMediumTest.java b/server/sonar-server/src/test/java/org/sonar/server/rule/RuleServiceMediumTest.java
index 320f6ec9eba..c571bf96836 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/rule/RuleServiceMediumTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/rule/RuleServiceMediumTest.java
@@ -71,7 +71,7 @@ public class RuleServiceMediumTest {
@Test
public void get_rule_by_key() {
- userSessionRule.logon().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
RuleKey key = RuleKey.of("java", "S001");
@@ -87,7 +87,7 @@ public class RuleServiceMediumTest {
@Test
public void get_non_null_rule_by_key() {
- userSessionRule.logon().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
RuleKey key = RuleKey.of("java", "S001");
@@ -106,7 +106,7 @@ public class RuleServiceMediumTest {
@Test
public void get_rule_by_key_escape_description_on_manual_rule() {
- userSessionRule.logon().logon().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login().login().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
RuleDto manualRule = RuleTesting.newManualRule("My manual")
.setDescription("Manual rule desc
");
@@ -157,7 +157,7 @@ public class RuleServiceMediumTest {
@Test
public void update_rule() {
- userSessionRule.logon("me").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("me").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
RuleKey key = RuleKey.of("java", "S001");
@@ -192,7 +192,7 @@ public class RuleServiceMediumTest {
@Test
public void create_rule() {
- userSessionRule.logon().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
// Create template rule
RuleKey templateRuleKey = RuleKey.of("java", "S001");
@@ -223,7 +223,7 @@ public class RuleServiceMediumTest {
@Test
public void delete_rule() {
- userSessionRule.logon().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
// Create template rule
RuleKey templateRuleKey = RuleKey.of("java", "S001");
diff --git a/server/sonar-server/src/test/java/org/sonar/server/rule/RuleUpdaterMediumTest.java b/server/sonar-server/src/test/java/org/sonar/server/rule/RuleUpdaterMediumTest.java
index 78f192c8bed..5a5888725ef 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/rule/RuleUpdaterMediumTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/rule/RuleUpdaterMediumTest.java
@@ -125,7 +125,7 @@ public class RuleUpdaterMediumTest {
@Test
public void set_markdown_note() {
- userSessionRule.logon("me");
+ userSessionRule.login("me");
ruleDao.insert(dbSession, RuleTesting.newDto(RULE_KEY)
.setNoteData(null)
diff --git a/server/sonar-server/src/test/java/org/sonar/server/rule/ws/CreateActionMediumTest.java b/server/sonar-server/src/test/java/org/sonar/server/rule/ws/CreateActionMediumTest.java
index df8e83952e4..3180807140b 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/rule/ws/CreateActionMediumTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/rule/ws/CreateActionMediumTest.java
@@ -51,7 +51,7 @@ public class CreateActionMediumTest {
@ClassRule
public static ServerTester tester = new ServerTester();
@Rule
- public UserSessionRule userSessionRule = UserSessionRule.forServerTester(tester).logon()
+ public UserSessionRule userSessionRule = UserSessionRule.forServerTester(tester).login()
.setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
WsTester wsTester;
diff --git a/server/sonar-server/src/test/java/org/sonar/server/rule/ws/ShowActionMediumTest.java b/server/sonar-server/src/test/java/org/sonar/server/rule/ws/ShowActionMediumTest.java
index 3a63e84a41a..2ca529121ef 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/rule/ws/ShowActionMediumTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/rule/ws/ShowActionMediumTest.java
@@ -51,7 +51,7 @@ public class ShowActionMediumTest {
@ClassRule
public static ServerTester tester = new ServerTester();
@Rule
- public UserSessionRule userSessionRule = UserSessionRule.forServerTester(tester).logon()
+ public UserSessionRule userSessionRule = UserSessionRule.forServerTester(tester).login()
.setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
WsTester wsTester;
diff --git a/server/sonar-server/src/test/java/org/sonar/server/rule/ws/UpdateActionMediumTest.java b/server/sonar-server/src/test/java/org/sonar/server/rule/ws/UpdateActionMediumTest.java
index fa6bae4d887..0997d956ec4 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/rule/ws/UpdateActionMediumTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/rule/ws/UpdateActionMediumTest.java
@@ -51,7 +51,7 @@ public class UpdateActionMediumTest {
public static ServerTester tester = new ServerTester();
@Rule
public UserSessionRule userSessionRule = UserSessionRule.forServerTester(tester).
- logon().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ login().setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
WsTester wsTester;
diff --git a/server/sonar-server/src/test/java/org/sonar/server/search/QueryContextTest.java b/server/sonar-server/src/test/java/org/sonar/server/search/QueryContextTest.java
index fa621d6a04d..650200e55a8 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/search/QueryContextTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/search/QueryContextTest.java
@@ -32,7 +32,7 @@ import static org.junit.Assert.fail;
public class QueryContextTest {
@Rule
- public UserSessionRule userSessionRule = UserSessionRule.standalone().logon("john").setUserGroups("sonar-users");
+ public UserSessionRule userSessionRule = UserSessionRule.standalone().login("john").setUserGroups("sonar-users");
QueryContext options;
diff --git a/server/sonar-server/src/test/java/org/sonar/server/source/ws/HashActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/source/ws/HashActionTest.java
index e25e14ddf96..3b1dde59945 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/source/ws/HashActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/source/ws/HashActionTest.java
@@ -76,7 +76,7 @@ public class HashActionTest {
@Test
public void show_hashes() throws Exception {
db.prepareDbUnit(getClass(), "shared.xml");
- userSessionRule.logon("polop").addProjectUuidPermissions(UserRole.USER, PROJECT_UUID);
+ userSessionRule.login("polop").addProjectUuidPermissions(UserRole.USER, PROJECT_UUID);
WsTester.TestRequest request = tester.newGetRequest("api/sources", "hash").setParam("key", COMPONENT_KEY);
assertThat(request.execute().outputAsString()).isEqualTo("987654");
@@ -85,7 +85,7 @@ public class HashActionTest {
@Test
public void hashes_empty_if_no_source() throws Exception {
db.prepareDbUnit(getClass(), "no_source.xml");
- userSessionRule.logon("polop").addProjectUuidPermissions(UserRole.USER, PROJECT_UUID);
+ userSessionRule.login("polop").addProjectUuidPermissions(UserRole.USER, PROJECT_UUID);
WsTester.TestRequest request = tester.newGetRequest("api/sources", "hash").setParam("key", COMPONENT_KEY);
request.execute().assertNoContent();
@@ -93,7 +93,7 @@ public class HashActionTest {
@Test
public void fail_to_show_hashes_if_file_does_not_exist() {
- userSessionRule.logon("polop").addProjectUuidPermissions(UserRole.USER, PROJECT_UUID);
+ userSessionRule.login("polop").addProjectUuidPermissions(UserRole.USER, PROJECT_UUID);
try {
WsTester.TestRequest request = tester.newGetRequest("api/sources", "hash").setParam("key", COMPONENT_KEY);
request.execute();
@@ -107,7 +107,7 @@ public class HashActionTest {
public void fail_on_missing_permission() throws Exception {
db.prepareDbUnit(getClass(), "shared.xml");
- userSessionRule.logon("polop");
+ userSessionRule.login("polop");
tester.newGetRequest("api/sources", "hash").setParam("key", COMPONENT_KEY).execute();
}
}
diff --git a/server/sonar-server/src/test/java/org/sonar/server/source/ws/LinesActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/source/ws/LinesActionTest.java
index e838bbd5233..b93a8a23b3d 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/source/ws/LinesActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/source/ws/LinesActionTest.java
@@ -155,7 +155,7 @@ public class LinesActionTest {
esTester.putDocuments(SourceLineIndexDefinition.INDEX, SourceLineIndexDefinition.TYPE, line1, line2, line3);
- userSessionRule.logon("login").addProjectUuidPermissions(UserRole.CODEVIEWER, PROJECT_UUID);
+ userSessionRule.login("login").addProjectUuidPermissions(UserRole.CODEVIEWER, PROJECT_UUID);
WsTester.TestRequest request = wsTester.newGetRequest("api/sources", "lines").setParam("uuid", FILE_UUID);
request.execute().assertJson(getClass(), "show_source.json");
@@ -165,7 +165,7 @@ public class LinesActionTest {
public void fail_to_show_source_if_no_source_found() {
newFile();
- userSessionRule.logon("login").addProjectUuidPermissions(UserRole.CODEVIEWER, PROJECT_UUID);
+ userSessionRule.login("login").addProjectUuidPermissions(UserRole.CODEVIEWER, PROJECT_UUID);
try {
WsTester.TestRequest request = wsTester.newGetRequest("api/sources", "lines").setParam("uuid", FILE_UUID);
@@ -180,7 +180,7 @@ public class LinesActionTest {
public void show_source_with_from_and_to_params() throws Exception {
newFile();
- userSessionRule.logon("login").addProjectUuidPermissions(UserRole.CODEVIEWER, PROJECT_UUID);
+ userSessionRule.login("login").addProjectUuidPermissions(UserRole.CODEVIEWER, PROJECT_UUID);
esTester.putDocuments(SourceLineIndexDefinition.INDEX, SourceLineIndexDefinition.TYPE,
new SourceLineDoc()
@@ -236,7 +236,7 @@ public class LinesActionTest {
.setUpdateDate(new Date())
);
- userSessionRule.logon("login").addProjectUuidPermissions(UserRole.CODEVIEWER, PROJECT_UUID);
+ userSessionRule.login("login").addProjectUuidPermissions(UserRole.CODEVIEWER, PROJECT_UUID);
WsTester.TestRequest request = wsTester.newGetRequest("api/sources", "lines").setParam("key", FILE_KEY);
request.execute().assertJson(getClass(), "show_source_by_file_key.json");
@@ -245,7 +245,7 @@ public class LinesActionTest {
@Test
public void fail_when_no_uuid_or_key_param() throws Exception {
newFile();
- userSessionRule.logon("login").addProjectUuidPermissions(UserRole.CODEVIEWER, PROJECT_UUID);
+ userSessionRule.login("login").addProjectUuidPermissions(UserRole.CODEVIEWER, PROJECT_UUID);
WsTester.TestRequest request = wsTester.newGetRequest("api/sources", "lines");
try {
@@ -260,7 +260,7 @@ public class LinesActionTest {
public void should_check_permission() throws Exception {
newFile();
- userSessionRule.logon("login");
+ userSessionRule.login("login");
wsTester.newGetRequest("api/sources", "lines")
.setParam("uuid", FILE_UUID)
diff --git a/server/sonar-server/src/test/java/org/sonar/server/tester/MockUserSessionTest.java b/server/sonar-server/src/test/java/org/sonar/server/tester/MockUserSessionTest.java
index f324062cb8e..ec3ba7a0b12 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/tester/MockUserSessionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/tester/MockUserSessionTest.java
@@ -28,8 +28,8 @@ public class MockUserSessionTest {
public void set_mock_session() {
MockUserSession mock = new MockUserSession("simon").setUserGroups("sonar-users");
- assertThat(mock.login()).isEqualTo("simon");
- assertThat(mock.userGroups()).containsOnly("sonar-users", "Anyone");
+ assertThat(mock.getLogin()).isEqualTo("simon");
+ assertThat(mock.getUserGroups()).containsOnly("sonar-users", "Anyone");
assertThat(mock.globalPermissions()).isEmpty();
assertThat(mock.isLoggedIn()).isTrue();
}
diff --git a/server/sonar-server/src/test/java/org/sonar/server/tester/UserSessionRule.java b/server/sonar-server/src/test/java/org/sonar/server/tester/UserSessionRule.java
index 32ab416fb7e..4a35ad5473e 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/tester/UserSessionRule.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/tester/UserSessionRule.java
@@ -50,7 +50,7 @@ import static com.google.common.base.Preconditions.checkState;
* In both cases, one can define user session behavior which should apply on all tests directly on the property, eg.:
*
* {@literal @}Rule
- * public UserSessionRule userSessionRule = UserSessionRule.standalone().logon("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
+ * public UserSessionRule userSessionRule = UserSessionRule.standalone().login("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
*
*
*
@@ -71,8 +71,9 @@ import static com.google.common.base.Preconditions.checkState;
* {@code UserSessionRule.standalone().anonymous()}.
*
*
- * To emulate an identified user, either use method {@link #logon(String)} if you want to specify the user's login, or
- * method {@link #logon()} which will do the same but using the value of {@link #DEFAULT_LOGIN} as the user's login.
+ * To emulate an identified user, either use method {@link #login(String)} if you want to specify the user's login, or
+ * method {@link #login()} which will do the same but using the value of {@link #DEFAULT_LOGIN} as the user's login
+ * (use the latest override if you don't care about the actual value of the login, it will save noise in your test).
*
*/
public class UserSessionRule implements TestRule, UserSession {
@@ -96,16 +97,16 @@ public class UserSessionRule implements TestRule, UserSession {
}
/**
- * Log on with the default login {@link #DEFAULT_LOGIN}
+ * Log in with the default login {@link #DEFAULT_LOGIN}
*/
- public UserSessionRule logon() {
- return logon(DEFAULT_LOGIN);
+ public UserSessionRule login() {
+ return login(DEFAULT_LOGIN);
}
/**
- * Log on with the specified login
+ * Log in with the specified login
*/
- public UserSessionRule logon(String login) {
+ public UserSessionRule login(String login) {
setCurrentUserSession(new MockUserSession(login));
return this;
}
@@ -241,25 +242,25 @@ public class UserSessionRule implements TestRule, UserSession {
@Override
@CheckForNull
- public String login() {
- return currentUserSession.login();
+ public String getLogin() {
+ return currentUserSession.getLogin();
}
@Override
@CheckForNull
- public String name() {
- return currentUserSession.name();
+ public String getName() {
+ return currentUserSession.getName();
}
@Override
@CheckForNull
- public Integer userId() {
- return currentUserSession.userId();
+ public Integer getUserId() {
+ return currentUserSession.getUserId();
}
@Override
- public Set userGroups() {
- return currentUserSession.userGroups();
+ public Set getUserGroups() {
+ return currentUserSession.getUserGroups();
}
@Override
diff --git a/server/sonar-server/src/test/java/org/sonar/server/ui/ws/ComponentNavigationActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/ui/ws/ComponentNavigationActionTest.java
index 497b6b49d01..00d5ab1c7a1 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/ui/ws/ComponentNavigationActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/ui/ws/ComponentNavigationActionTest.java
@@ -168,7 +168,7 @@ public class ComponentNavigationActionTest {
dbClient.propertiesDao().setProperty(new PropertyDto().setKey("favourite").setResourceId(project.getId()).setUserId((long) userId), session);
session.commit();
- userSessionRule.logon("obiwan").setUserId(userId).addProjectUuidPermissions(UserRole.USER, "abcd");
+ userSessionRule.login("obiwan").setUserId(userId).addProjectUuidPermissions(UserRole.USER, "abcd");
wsTester = new WsTester(new NavigationWs(new ComponentNavigationAction(dbClient, activeDashboardDao,
new Views(userSessionRule), i18n, resourceTypes, userSessionRule)));
@@ -187,7 +187,7 @@ public class ComponentNavigationActionTest {
.setLast(true).setQualifier(project.qualifier()).setResourceId(project.getId()).setRootProjectId(project.getId()).setScope(project.scope()));
session.commit();
- userSessionRule.logon("obiwan").setUserId(userId).addProjectUuidPermissions(UserRole.USER, "abcd");
+ userSessionRule.login("obiwan").setUserId(userId).addProjectUuidPermissions(UserRole.USER, "abcd");
wsTester = new WsTester(new NavigationWs(new ComponentNavigationAction(dbClient, activeDashboardDao,
new Views(userSessionRule), i18n, resourceTypes, userSessionRule)));
@@ -221,7 +221,7 @@ public class ComponentNavigationActionTest {
activeDashboardDao.insert(new ActiveDashboardDto().setDashboardId(dashboard.getId()));
session.commit();
- userSessionRule.logon("obiwan").addProjectUuidPermissions(UserRole.USER, "abcd");
+ userSessionRule.login("obiwan").addProjectUuidPermissions(UserRole.USER, "abcd");
wsTester = new WsTester(new NavigationWs(new ComponentNavigationAction(dbClient, activeDashboardDao,
new Views(userSessionRule), i18n, resourceTypes, userSessionRule)));
@@ -331,7 +331,7 @@ public class ComponentNavigationActionTest {
.setKey("polop").setName("Polop").setLanguage(language));
session.commit();
- userSessionRule.logon("obiwan").setUserId(userId)
+ userSessionRule.login("obiwan").setUserId(userId)
.addProjectUuidPermissions(UserRole.USER, "abcd")
.addProjectUuidPermissions(UserRole.ADMIN, "abcd");
@@ -383,7 +383,7 @@ public class ComponentNavigationActionTest {
dbClient.componentDao().insert(session, project);
session.commit();
- userSessionRule.logon("obiwan").setUserId(userId)
+ userSessionRule.login("obiwan").setUserId(userId)
.addProjectUuidPermissions(UserRole.USER, "abcd")
.addProjectUuidPermissions(UserRole.ADMIN, "abcd");
@@ -414,7 +414,7 @@ public class ComponentNavigationActionTest {
dbClient.componentDao().insert(session, project, module);
session.commit();
- userSessionRule.logon("obiwan").setUserId(userId)
+ userSessionRule.login("obiwan").setUserId(userId)
.addProjectUuidPermissions(UserRole.USER, "abcd")
.addProjectUuidPermissions(UserRole.ADMIN, "abcd");
@@ -432,7 +432,7 @@ public class ComponentNavigationActionTest {
.setKey("polop").setName("Polop").setLanguage(language));
session.commit();
- userSessionRule.logon("obiwan").setUserId(userId)
+ userSessionRule.login("obiwan").setUserId(userId)
.addProjectUuidPermissions(UserRole.USER, "abcd")
.setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
diff --git a/server/sonar-server/src/test/java/org/sonar/server/ui/ws/GlobalNavigationActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/ui/ws/GlobalNavigationActionTest.java
index 94fe1731ba6..337c8b36e92 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/ui/ws/GlobalNavigationActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/ui/ws/GlobalNavigationActionTest.java
@@ -133,7 +133,7 @@ public class GlobalNavigationActionTest {
public void nominal_call_for_user() throws Exception {
nominalSetup();
- userSessionRule.logon("obiwan");
+ userSessionRule.login("obiwan");
wsTester.newGetRequest("api/navigation", "global").execute().assertJson(getClass(), "user.json");
}
@@ -142,7 +142,7 @@ public class GlobalNavigationActionTest {
public void nominal_call_for_admin() throws Exception {
nominalSetup();
- userSessionRule.logon("obiwan").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
+ userSessionRule.login("obiwan").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
wsTester.newGetRequest("api/navigation", "global").execute().assertJson(getClass(), "admin.json");
}
@@ -151,7 +151,7 @@ public class GlobalNavigationActionTest {
public void nominal_call_for_user_without_configured_dashboards() throws Exception {
nominalSetup();
- userSessionRule.logon("anakin");
+ userSessionRule.login("anakin");
wsTester.newGetRequest("api/navigation", "global").execute().assertJson(getClass(), "anonymous.json");
}
diff --git a/server/sonar-server/src/test/java/org/sonar/server/user/DefaultUserServiceTest.java b/server/sonar-server/src/test/java/org/sonar/server/user/DefaultUserServiceTest.java
index c4598b2685c..d757d3ab17f 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/user/DefaultUserServiceTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/user/DefaultUserServiceTest.java
@@ -95,7 +95,7 @@ public class DefaultUserServiceTest {
@Test
public void self_deactivation_is_not_possible() {
try {
- userSessionRule.logon("simon").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
+ userSessionRule.login("simon").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
service.deactivate("simon");
fail();
} catch (BadRequestException e) {
@@ -107,7 +107,7 @@ public class DefaultUserServiceTest {
@Test
public void user_deactivation_requires_admin_permission() {
try {
- userSessionRule.logon("simon").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
+ userSessionRule.login("simon").setGlobalPermissions(GlobalPermissions.QUALITY_PROFILE_ADMIN);
service.deactivate("julien");
fail();
} catch (ForbiddenException e) {
@@ -117,14 +117,14 @@ public class DefaultUserServiceTest {
@Test
public void deactivate_user() {
- userSessionRule.logon("simon").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
+ userSessionRule.login("simon").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
service.deactivate("julien");
verify(userUpdater).deactivateUserByLogin("julien");
}
@Test
public void fail_to_deactivate_when_blank_login() {
- userSessionRule.logon("simon").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
+ userSessionRule.login("simon").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
try {
service.deactivate("");
fail();
diff --git a/server/sonar-server/src/test/java/org/sonar/server/user/RubyUserSessionTest.java b/server/sonar-server/src/test/java/org/sonar/server/user/RubyUserSessionTest.java
index 80b6b61e735..eb6160d5717 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/user/RubyUserSessionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/user/RubyUserSessionTest.java
@@ -49,10 +49,10 @@ public class RubyUserSessionTest {
UserSession session = threadLocalUserSession.get();
assertThat(session).isNotNull();
- assertThat(session.login()).isEqualTo("karadoc");
- assertThat(session.name()).isEqualTo("Karadoc");
- assertThat(session.userId()).isEqualTo(123);
- assertThat(session.userGroups()).containsOnly("sonar-users", "Anyone");
+ assertThat(session.getLogin()).isEqualTo("karadoc");
+ assertThat(session.getName()).isEqualTo("Karadoc");
+ assertThat(session.getUserId()).isEqualTo(123);
+ assertThat(session.getUserGroups()).containsOnly("sonar-users", "Anyone");
assertThat(session.isLoggedIn()).isTrue();
assertThat(session.locale()).isEqualTo(Locale.FRENCH);
}
@@ -64,10 +64,10 @@ public class RubyUserSessionTest {
UserSession session = threadLocalUserSession.get();
assertThat(session).isNotNull();
- assertThat(session.login()).isNull();
- assertThat(session.name()).isNull();
- assertThat(session.userId()).isNull();
- assertThat(session.userGroups()).containsOnly("Anyone");
+ assertThat(session.getLogin()).isNull();
+ assertThat(session.getName()).isNull();
+ assertThat(session.getUserId()).isNull();
+ assertThat(session.getUserGroups()).containsOnly("Anyone");
assertThat(session.isLoggedIn()).isFalse();
assertThat(session.locale()).isEqualTo(Locale.FRENCH);
}
diff --git a/server/sonar-server/src/test/java/org/sonar/server/user/ServerUserSessionTest.java b/server/sonar-server/src/test/java/org/sonar/server/user/ServerUserSessionTest.java
index d9c6ba1cfff..a333e423258 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/user/ServerUserSessionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/user/ServerUserSessionTest.java
@@ -42,7 +42,7 @@ public class ServerUserSessionTest {
@Test
public void login_should_not_be_empty() {
UserSession session = newServerUserSession().setLogin("");
- assertThat(session.login()).isNull();
+ assertThat(session.getLogin()).isNull();
assertThat(session.isLoggedIn()).isFalse();
}
diff --git a/server/sonar-server/src/test/java/org/sonar/server/user/ThreadLocalUserSessionTest.java b/server/sonar-server/src/test/java/org/sonar/server/user/ThreadLocalUserSessionTest.java
index 69de8cc00bd..40a64d627ed 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/user/ThreadLocalUserSessionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/user/ThreadLocalUserSessionTest.java
@@ -43,8 +43,8 @@ public class ThreadLocalUserSessionTest {
UserSession session = threadLocalUserSession.get();
assertThat(session).isNotNull();
- assertThat(session.login()).isNull();
- assertThat(session.userId()).isNull();
+ assertThat(session.getLogin()).isNull();
+ assertThat(session.getUserId()).isNull();
assertThat(session.isLoggedIn()).isFalse();
// default locale
assertThat(session.locale()).isEqualTo(Locale.ENGLISH);
@@ -56,8 +56,8 @@ public class ThreadLocalUserSessionTest {
UserSession session = threadLocalUserSession.get();
assertThat(session).isNotNull();
- assertThat(session.userId()).isEqualTo(123);
- assertThat(session.login()).isEqualTo("karadoc");
+ assertThat(session.getUserId()).isEqualTo(123);
+ assertThat(session.getLogin()).isEqualTo("karadoc");
assertThat(session.isLoggedIn()).isTrue();
assertThat(session.locale()).isEqualTo(Locale.FRENCH);
}
diff --git a/server/sonar-server/src/test/java/org/sonar/server/user/ws/ChangePasswordActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/user/ws/ChangePasswordActionTest.java
index bf11bb03311..407337ab5aa 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/user/ws/ChangePasswordActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/user/ws/ChangePasswordActionTest.java
@@ -62,7 +62,7 @@ public class ChangePasswordActionTest {
@ClassRule
public static final EsTester esTester = new EsTester().addDefinitions(new UserIndexDefinition(settings));
@Rule
- public UserSessionRule userSessionRule = UserSessionRule.standalone().logon("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
+ public UserSessionRule userSessionRule = UserSessionRule.standalone().login("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
WebService.Controller controller;
@@ -105,7 +105,7 @@ public class ChangePasswordActionTest {
public void fail_on_missing_permission() throws Exception {
createUser();
- userSessionRule.logon("polop");
+ userSessionRule.login("polop");
tester.newPostRequest("api/users", "change_password")
.setParam("login", "john")
.execute();
diff --git a/server/sonar-server/src/test/java/org/sonar/server/user/ws/CreateActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/user/ws/CreateActionTest.java
index 3ef6f083c88..aa41c94be68 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/user/ws/CreateActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/user/ws/CreateActionTest.java
@@ -116,7 +116,7 @@ public class CreateActionTest {
@Test
public void create_user() throws Exception {
- userSessionRule.logon("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
+ userSessionRule.login("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
tester.newPostRequest("api/users", "create")
.setParam("login", "john")
@@ -136,7 +136,7 @@ public class CreateActionTest {
@Test
public void reactivate_user() throws Exception {
- userSessionRule.logon("admin").setLocale(Locale.FRENCH).setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
+ userSessionRule.login("admin").setLocale(Locale.FRENCH).setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
dbClient.userDao().insert(session, new UserDto()
.setEmail("john@email.com")
@@ -163,7 +163,7 @@ public class CreateActionTest {
@Test(expected = ForbiddenException.class)
public void fail_on_missing_permission() throws Exception {
- userSessionRule.logon("not_admin");
+ userSessionRule.login("not_admin");
tester.newPostRequest("api/users", "create")
.setParam("login", "john")
diff --git a/server/sonar-server/src/test/java/org/sonar/server/user/ws/CurrentUserActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/user/ws/CurrentUserActionTest.java
index 2a6d6502896..3ee91682a3f 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/user/ws/CurrentUserActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/user/ws/CurrentUserActionTest.java
@@ -44,7 +44,7 @@ public class CurrentUserActionTest {
@Test
public void authenticated() throws Exception {
- userSessionRule.logon("obiwan.kenobi").setName("Obiwan Kenobi")
+ userSessionRule.login("obiwan.kenobi").setName("Obiwan Kenobi")
.setGlobalPermissions(GlobalPermissions.ALL.toArray(new String[0]));
tester.newGetRequest("api/users", "current").execute().assertJson(getClass(), "authenticated.json");
}
diff --git a/server/sonar-server/src/test/java/org/sonar/server/user/ws/DeactivateActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/user/ws/DeactivateActionTest.java
index 005ec57c260..8a1ee1daf74 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/user/ws/DeactivateActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/user/ws/DeactivateActionTest.java
@@ -108,7 +108,7 @@ public class DeactivateActionTest {
public void deactivate_user() throws Exception {
createUser();
- userSessionRule.logon("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
+ userSessionRule.login("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
tester.newPostRequest("api/users", "deactivate")
.setParam("login", "john")
.execute()
@@ -122,14 +122,14 @@ public class DeactivateActionTest {
public void fail_on_missing_permission() throws Exception {
createUser();
- userSessionRule.logon("not_admin");
+ userSessionRule.login("not_admin");
tester.newPostRequest("api/users", "deactivate")
.setParam("login", "john").execute();
}
@Test(expected = NotFoundException.class)
public void fail_on_unknown_user() throws Exception {
- userSessionRule.logon("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
+ userSessionRule.login("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
tester.newPostRequest("api/users", "deactivate")
.setParam("login", "john").execute();
}
diff --git a/server/sonar-server/src/test/java/org/sonar/server/user/ws/UpdateActionTest.java b/server/sonar-server/src/test/java/org/sonar/server/user/ws/UpdateActionTest.java
index 42c31591d83..84f19cd13a4 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/user/ws/UpdateActionTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/user/ws/UpdateActionTest.java
@@ -59,7 +59,7 @@ public class UpdateActionTest {
@ClassRule
public static final EsTester esTester = new EsTester().addDefinitions(new UserIndexDefinition(settings));
@Rule
- public final UserSessionRule userSessionRule = UserSessionRule.standalone().logon("admin")
+ public final UserSessionRule userSessionRule = UserSessionRule.standalone().login("admin")
.setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
WebService.Controller controller;
@@ -104,7 +104,7 @@ public class UpdateActionTest {
public void fail_on_missing_permission() throws Exception {
createUser();
- userSessionRule.logon("polop");
+ userSessionRule.login("polop");
tester.newPostRequest("api/users", "update")
.setParam("login", "john")
.execute();
diff --git a/server/sonar-server/src/test/java/org/sonar/server/view/index/ViewIndexerMediumTest.java b/server/sonar-server/src/test/java/org/sonar/server/view/index/ViewIndexerMediumTest.java
index 0493cc734ef..6f9ae0d9a0f 100644
--- a/server/sonar-server/src/test/java/org/sonar/server/view/index/ViewIndexerMediumTest.java
+++ b/server/sonar-server/src/test/java/org/sonar/server/view/index/ViewIndexerMediumTest.java
@@ -134,7 +134,7 @@ public class ViewIndexerMediumTest {
private void setDefaultProjectPermission(ComponentDto project) {
// project can be seen by anyone and by code viewer
- userSessionRule.logon("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
+ userSessionRule.login("admin").setGlobalPermissions(GlobalPermissions.SYSTEM_ADMIN);
tester.get(InternalPermissionService.class).addPermission(new PermissionChange().setComponentKey(project.getKey()).setGroup(DefaultGroups.ANYONE).setPermission(UserRole.USER));
}
--
2.39.5